FindBook      Google Book      Amazon      博客來     
  • Information security = 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022 : proceedings /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Information security/ edited by Willy Susilo ... [et al.].
    其他題名: 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022 : proceedings /
    其他題名: ISC 2022
    其他作者: Susilo, Willy.
    團體作者: ISC (Conference : Information security)
    出版者: Cham :Springer International Publishing : : 2022.,
    面頁冊數: xxiii, 510 p. :ill. (some col.), digital ;24 cm.
    內容註: Cryptography -- Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs -- Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting -- Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files -- Witness Encryption from Smooth Projective Hashing System -- Post-Quantum Cryptography -- More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model -- QUIC Protocol with Post-Quantum Authentication -- Batched Fully Homomorphic Encryption from TFHE -- Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization -- Cryptanalysis -- Further Cryptanalysis of a Type of RSA Variants -- The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64 -- Efficient Scalar Multiplication on Koblitz Curves with Pre-computation -- Blockchain -- Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps -- Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization -- GRUZ : Practical Resource Fair Exchange without Blockchain -- Daric: A Storage Efficient Payment Channel With Punishment Mechanism -- A Blockchain-based Mutual Authentication Protocol for Smart Home -- Email and Web Security -- OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control -- EarlyCrow: Detecting APT Malware Command and Control Over HTTP(S) Using Contextual Summaries -- Malware -- ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence -- Dissecting Applications Uninstallers & Removers: Are they effective? -- Representing LLVM-IR in a Code Property Graph -- Why we need a theory of maliciousness: Hardware Performance Counters in security -- Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination With Whole-system Replay -- AI Security -- AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition -- HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud -- Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64 -- CFL: Cluster Federated Learning in Large-scale Peer-to-Peer Networks -- Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing -- Communication-Efficient and Secure Federated Learning Based on Adaptive One-bit Compressed Sensing.
    Contained By: Springer Nature eBook
    標題: Computer networks - Security measures -
    電子資源: https://doi.org/10.1007/978-3-031-22390-7
    ISBN: 9783031223907
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入