FindBook      Google Book      Amazon      博客來     
  • Information security applications = 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23-25, 2023 : revised selected papers /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Information security applications/ edited by Howon Kim, Jonghee Youn.
    其他題名: 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23-25, 2023 : revised selected papers /
    其他題名: WISA 2023
    其他作者: Kim, Howon.
    團體作者: WISA (Workshop : Information security)
    出版者: Singapore :Springer Nature Singapore : : 2024.,
    面頁冊數: xix, 350 p. :ill., digital ;24 cm.
    內容註: Cryptography -- A New Higher Order Differential of LCB -- Bloomier filters on 3-hypergraphs -- Principal Component Analysis over the Boolean Circuit within TFHE Scheme -- A security analysis on MQ-Sign -- Network and Application Security -- Research on Security Threats Using VPN in Zero Trust Environments -- A Blockchain-based Mobile Crowdsensing and Its Incentive Mechanism -- A New Frontier in Digital Security: Verification for NFT Image using Deep Learning-based ConvNeXt Model in Quantum Blockchain -- AE-LSTM based anomaly detection system for communication over DNP 3.0 -- Privacy & Management -- Systematic Evaluation of Robustness Against Model Inversion Attacks on Split Learning -- Vulnerability Assessment Framework Based on In-the-Wild Exploitability for Prioritizing Patch Application -- Patchman: Firmware Update Delivery Service Over the Blockchain for IoT Environment -- Security Risk Indicator for Open Source Software to Measure Software Development Status -- Attacks & Defenses -- Defending AirType against Inference Attacks using 3D In-Air Keyboard Layouts: Design and Evaluation -- Robust Training for Deepfake Detection Models Against Disruption Induced Data Poisoning -- Multi-class Malware Detection via Deep Graph Convolutional Networks using TF-IDF-based Attributed Call Graphs -- OCR meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime -- Enriching Vulnerability Reports Through Automated and Augmented Description Summarization -- Cryptography -- Protecting Kernel Code Integrity with PMP on RISC-V -- Exploiting Memory Page Management in KSM for Remote Memory Deduplication Attack -- Mutation Methods for Structured Input to Enhance Path Coverage of Fuzzers -- Improved Differential-Linear Cryptanalysis of Reduced Rounds of ChaCha -- SP-Fuzz: Fuzzing soft PLC with Semi-automated Harness Synthesis -- Post-Quantum Cryptography & Quantum Cryptanalysis -- Post-Quantum Cryptography & Quantum Cryptanalysis -- PQ-DPoL: An Efficient Post-Quantum Blockchain Consensus Algorithm -- Efficient Implementation of the Classic McEliece on ARMv8 processors -- Evaluating KpqC Algorithm Submissions: A Balanced and Clean Benchmarking Approach.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-981-99-8024-6
    ISBN: 9789819980246
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入