紀錄類型: |
書目-電子資源
: Monograph/item
|
正題名/作者: |
Applied cryptography and network security workshops/ edited by Martin Andreoni. |
其他題名: |
ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024 : proceedings. |
其他題名: |
ACNS 2024 |
其他作者: |
Andreoni, Martin. |
團體作者: |
ACNS (Conference) |
出版者: |
Cham :Springer Nature Switzerland : : 2024., |
面頁冊數: |
xxi, 399 p. :ill. (some col.), digital ;24 cm. |
內容註: |
AIBlock - Application Intelligence and Blockchain Security: An End-to-End Secure Solution for IoMT Data Exchange -- EasyLog: An Effcient Kernel Logging Service for Machine Learning -- LM-cAPI:A Lite Model based on API Core Semantic Information for Malware Classification -- ACKI NACKI: a Probabilistic Proof-of-Stake consensus protocol with fast finality and parallelization. AIHWS - Artificial Intelligence in Hardware Security: FPGA Implementation of Physically Unclonable Functions based on Multi-threshold Delay Time Measurement Method to Mitigate Modeling Attacks -- Incorporating Cluster Analysis of Feature Vectors for Non-profiled Deep-learning-based Side-channel Attacks -- Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attacks -- Diversity Algorithms for Laser Fault Injection -- One for All, All for Ascon: Ensemble-based Deep Learning Side-channel Analysis -- CNN architecture extraction on edge GPU -- Harnessing the Power of LLMs in Hardware Trojan Design -- Everything All At Once: Deep Learning Side-Channel Analysis Optimization Framework -- AIoTS - Artificial Intelligence and Industrial IoT Security: Device Fingerprinting in a Smart Grid CPS -- Power Quality Forecasting of Microgrids using Adaptive Privacy-Preserving Machine Learning -- Evaluation of Lightweight Machine Learning-based NIDS Techniques for Industrial IoT -- Measuring Cyber Resilience of IoT-enabled Critical National Infrastructure -- SCI - Secure Cryptographic Implementation: Towards Discovering Quantum-Threats for Applications using Open-Source Libraries -- Pushing AES-256-GCM to Limits: Design, Implementation and Real FPGA Tests -- Automated Generation of Masked Nonlinear Components: From Lookup Tables to Private Circuits -- A Command-Activated Hardware Trojan Detection Method Based on LU-NAR Framework -- Cross-Correlation Based Trace Segmentation for Clustering Power Analysis on Public Key Cryptosystems -- Fully Hybrid TLSv1.3 in WolfSSL on Cortex-M4. |
Contained By: |
Springer Nature eBook |
標題: |
Data encryption (Computer science) - Congresses. - |
電子資源: |
https://doi.org/10.1007/978-3-031-61486-6 |
ISBN: |
9783031614866 |