語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information security = 26th Internat...
~
ISC (Conference : Information security) (2023 :)
FindBook
Google Book
Amazon
博客來
Information security = 26th International Conference, ISC 2023, Groningen, the Netherlands, November 15-17, 2023 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Information security/ edited by Elias Athanasopoulos, Bart Mennink.
其他題名:
26th International Conference, ISC 2023, Groningen, the Netherlands, November 15-17, 2023 : proceedings /
其他題名:
ISC 2023
其他作者:
Athanasopoulos, Elias.
團體作者:
ISC (Conference : Information security)
出版者:
Cham :Springer Nature Switzerland : : 2023.,
面頁冊數:
xiv, 598 p. :illustrations (some col.), digital ;24 cm.
內容註:
Privacy: Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense against Model Inversion Attacks -- Privacy-preserving Medical Data Generation using Adversarial Learning -- Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning -- Intrusion Detection and Systems: SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection -- VNGuard: Intrusion Detection System for In-Vehicle Networks -- RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing -- Machine Learning: Loss and Likelihood Based Membership Inference of Diffusion Models -- Symmetry Defense Against CNN Adversarial Perturbation Attacks -- Web Security: Load-and-Act: Increasing Page Coverage of Web Applications -- From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions -- Mobile Security and Trusted Execution: Libra : Library Identification in Obfuscated Android Apps -- Certificate reuse in Android applications -- TC4SE: A High-performance Trusted Channel Mechanism for Secure Enclave-based Trusted Execution Environments -- Post-Quantum Cryptography: Performance Impact of PQC KEMs on TLS 1.3 under Varying Network Characteristics -- Protecting Private Keys of Dilithium using Hardware Transactional Memory -- Multiparty Computation: Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals -- Evolving Conditional Disclosure of Secrets -- Symmetric Cryptography: Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size -- Impossible Differential Cryptanalysis of the FBC Block Cipher -- Fregata: Faster Homomorphic Evaluation of AES via TFHE -- Key Management: Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography -- On the Privacy-preserving Infrastructure for Authenticated Key Exchange -- Hybrid Group Key Exchange with Application to Constrained Networks -- Functional and Updatable Encryption -- Dynamic Multi-Server Updatable Encryption -- Trace-and-Revoke Quadratic Functional Encryption -- Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings -- Signatures, Hashes, and Cryptanalysis: Robust Property-Preserving Hash Meets Homomorphism -- Withdrawable Signature: How to Call off a Signature -- An Improved BKW Algorithm for Solving LWE with Small Secrets.
Contained By:
Springer Nature eBook
標題:
Computer networks - Security measures -
電子資源:
https://doi.org/10.1007/978-3-031-49187-0
ISBN:
9783031491870
Information security = 26th International Conference, ISC 2023, Groningen, the Netherlands, November 15-17, 2023 : proceedings /
Information security
26th International Conference, ISC 2023, Groningen, the Netherlands, November 15-17, 2023 : proceedings /[electronic resource] :ISC 2023edited by Elias Athanasopoulos, Bart Mennink. - Cham :Springer Nature Switzerland :2023. - xiv, 598 p. :illustrations (some col.), digital ;24 cm. - Lecture notes in computer science,144110302-9743 ;. - Lecture notes in computer science ;14411..
Privacy: Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense against Model Inversion Attacks -- Privacy-preserving Medical Data Generation using Adversarial Learning -- Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning -- Intrusion Detection and Systems: SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection -- VNGuard: Intrusion Detection System for In-Vehicle Networks -- RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing -- Machine Learning: Loss and Likelihood Based Membership Inference of Diffusion Models -- Symmetry Defense Against CNN Adversarial Perturbation Attacks -- Web Security: Load-and-Act: Increasing Page Coverage of Web Applications -- From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions -- Mobile Security and Trusted Execution: Libra : Library Identification in Obfuscated Android Apps -- Certificate reuse in Android applications -- TC4SE: A High-performance Trusted Channel Mechanism for Secure Enclave-based Trusted Execution Environments -- Post-Quantum Cryptography: Performance Impact of PQC KEMs on TLS 1.3 under Varying Network Characteristics -- Protecting Private Keys of Dilithium using Hardware Transactional Memory -- Multiparty Computation: Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals -- Evolving Conditional Disclosure of Secrets -- Symmetric Cryptography: Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size -- Impossible Differential Cryptanalysis of the FBC Block Cipher -- Fregata: Faster Homomorphic Evaluation of AES via TFHE -- Key Management: Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography -- On the Privacy-preserving Infrastructure for Authenticated Key Exchange -- Hybrid Group Key Exchange with Application to Constrained Networks -- Functional and Updatable Encryption -- Dynamic Multi-Server Updatable Encryption -- Trace-and-Revoke Quadratic Functional Encryption -- Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings -- Signatures, Hashes, and Cryptanalysis: Robust Property-Preserving Hash Meets Homomorphism -- Withdrawable Signature: How to Call off a Signature -- An Improved BKW Algorithm for Solving LWE with Small Secrets.
This book constitutes the proceedings of the 26th International Conference on Information Security, ISC 2023, which took place in Groningen, The Netherlands, in November 2023. The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis.
ISBN: 9783031491870
Standard No.: 10.1007/978-3-031-49187-0doiSubjects--Topical Terms:
582085
Computer networks
--Security measures
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Information security = 26th International Conference, ISC 2023, Groningen, the Netherlands, November 15-17, 2023 : proceedings /
LDR
:04174nmm a2200373 a 4500
001
2336034
003
DE-He213
005
20231130120812.0
006
m d
007
cr nn 008maaau
008
240402s2023 sz s 0 eng d
020
$a
9783031491870
$q
(electronic bk.)
020
$a
9783031491863
$q
(paper)
024
7
$a
10.1007/978-3-031-49187-0
$2
doi
035
$a
978-3-031-49187-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.I77 2023
111
2
$a
ISC (Conference : Information security)
$n
(26th :
$d
2023 :
$c
Groningen, Netherlands)
$3
3668858
245
1 0
$a
Information security
$h
[electronic resource] :
$b
26th International Conference, ISC 2023, Groningen, the Netherlands, November 15-17, 2023 : proceedings /
$c
edited by Elias Athanasopoulos, Bart Mennink.
246
3
$a
ISC 2023
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2023.
300
$a
xiv, 598 p. :
$b
illustrations (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
14411
505
0
$a
Privacy: Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense against Model Inversion Attacks -- Privacy-preserving Medical Data Generation using Adversarial Learning -- Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning -- Intrusion Detection and Systems: SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection -- VNGuard: Intrusion Detection System for In-Vehicle Networks -- RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing -- Machine Learning: Loss and Likelihood Based Membership Inference of Diffusion Models -- Symmetry Defense Against CNN Adversarial Perturbation Attacks -- Web Security: Load-and-Act: Increasing Page Coverage of Web Applications -- From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions -- Mobile Security and Trusted Execution: Libra : Library Identification in Obfuscated Android Apps -- Certificate reuse in Android applications -- TC4SE: A High-performance Trusted Channel Mechanism for Secure Enclave-based Trusted Execution Environments -- Post-Quantum Cryptography: Performance Impact of PQC KEMs on TLS 1.3 under Varying Network Characteristics -- Protecting Private Keys of Dilithium using Hardware Transactional Memory -- Multiparty Computation: Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals -- Evolving Conditional Disclosure of Secrets -- Symmetric Cryptography: Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size -- Impossible Differential Cryptanalysis of the FBC Block Cipher -- Fregata: Faster Homomorphic Evaluation of AES via TFHE -- Key Management: Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography -- On the Privacy-preserving Infrastructure for Authenticated Key Exchange -- Hybrid Group Key Exchange with Application to Constrained Networks -- Functional and Updatable Encryption -- Dynamic Multi-Server Updatable Encryption -- Trace-and-Revoke Quadratic Functional Encryption -- Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings -- Signatures, Hashes, and Cryptanalysis: Robust Property-Preserving Hash Meets Homomorphism -- Withdrawable Signature: How to Call off a Signature -- An Improved BKW Algorithm for Solving LWE with Small Secrets.
520
$a
This book constitutes the proceedings of the 26th International Conference on Information Security, ISC 2023, which took place in Groningen, The Netherlands, in November 2023. The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis.
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer Engineering and Networks.
$3
3538504
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Mobile and Network Security.
$3
3382377
700
1
$a
Athanasopoulos, Elias.
$3
2186519
700
1
$a
Mennink, Bart.
$3
3668859
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
14411.
$3
3668860
856
4 0
$u
https://doi.org/10.1007/978-3-031-49187-0
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9462239
電子資源
11.線上閱覽_V
電子書
EB TK5105.59
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入