Information security = 26th Internat...
ISC (Conference : Information security) (2023 :)

FindBook      Google Book      Amazon      博客來     
  • Information security = 26th International Conference, ISC 2023, Groningen, the Netherlands, November 15-17, 2023 : proceedings /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Information security/ edited by Elias Athanasopoulos, Bart Mennink.
    其他題名: 26th International Conference, ISC 2023, Groningen, the Netherlands, November 15-17, 2023 : proceedings /
    其他題名: ISC 2023
    其他作者: Athanasopoulos, Elias.
    團體作者: ISC (Conference : Information security)
    出版者: Cham :Springer Nature Switzerland : : 2023.,
    面頁冊數: xiv, 598 p. :illustrations (some col.), digital ;24 cm.
    內容註: Privacy: Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense against Model Inversion Attacks -- Privacy-preserving Medical Data Generation using Adversarial Learning -- Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning -- Intrusion Detection and Systems: SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection -- VNGuard: Intrusion Detection System for In-Vehicle Networks -- RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing -- Machine Learning: Loss and Likelihood Based Membership Inference of Diffusion Models -- Symmetry Defense Against CNN Adversarial Perturbation Attacks -- Web Security: Load-and-Act: Increasing Page Coverage of Web Applications -- From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions -- Mobile Security and Trusted Execution: Libra : Library Identification in Obfuscated Android Apps -- Certificate reuse in Android applications -- TC4SE: A High-performance Trusted Channel Mechanism for Secure Enclave-based Trusted Execution Environments -- Post-Quantum Cryptography: Performance Impact of PQC KEMs on TLS 1.3 under Varying Network Characteristics -- Protecting Private Keys of Dilithium using Hardware Transactional Memory -- Multiparty Computation: Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals -- Evolving Conditional Disclosure of Secrets -- Symmetric Cryptography: Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size -- Impossible Differential Cryptanalysis of the FBC Block Cipher -- Fregata: Faster Homomorphic Evaluation of AES via TFHE -- Key Management: Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography -- On the Privacy-preserving Infrastructure for Authenticated Key Exchange -- Hybrid Group Key Exchange with Application to Constrained Networks -- Functional and Updatable Encryption -- Dynamic Multi-Server Updatable Encryption -- Trace-and-Revoke Quadratic Functional Encryption -- Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings -- Signatures, Hashes, and Cryptanalysis: Robust Property-Preserving Hash Meets Homomorphism -- Withdrawable Signature: How to Call off a Signature -- An Improved BKW Algorithm for Solving LWE with Small Secrets.
    Contained By: Springer Nature eBook
    標題: Computer networks - Security measures -
    電子資源: https://doi.org/10.1007/978-3-031-49187-0
    ISBN: 9783031491870
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入