FindBook      Google Book      Amazon      博客來     
  • Applied cryptography and network security workshops = ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024 : proceedings.. Part II /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Applied cryptography and network security workshops/ edited by Martin Andreoni.
    其他題名: ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024 : proceedings.
    其他題名: ACNS 2024
    其他作者: Andreoni, Martin.
    團體作者: ACNS (Conference)
    出版者: Cham :Springer Nature Switzerland : : 2024.,
    面頁冊數: xxi, 243 p. :ill. (chiefly col.), digital ;24 cm.
    內容註: AAC - Workshop on Advances in Asymmetric Cryptanalysis: Forging tropical signatures -- Quantum Circuit Design for the Lee-Brickell based Information Set Decoding -- Projective Space Stern Decoding and Application to SDitH. SiMLA - Security in Machine Learning and its Applications: One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection -- Model Extraction Attack without Natural Images -- Privacy-Preserving Sentiment Analysis using Homomorphic Encryption and Attention Mechanisms -- Differential Privacy with Selected Privacy Budget ϵ in a Cyber Physical System Using Machine Learning. LEE - Low-Latency Encryption: Construction of 4 × 4 Lightweight Low-latency Involutory MDS Matrices CIMSS - Critical Infrastructure and Manufacturing System Security Guidelines for Cyber Risk Management in Autonomous Shipping Identity-based Cluster Authentication and Key Exchange (ID-CAKE) Message Broadcasting and Batch Verification in VANETs. POSTERS: One Time Chat - a toy end-to-end encrypted web messaging service -- Game Theoretic Modeling of Insider Threats in An Organization -- Smart Appliance Abnormal Electrical Power Consumption Detection -- Towards Secure 5G Infrastructures for Production Systems -- Cybersecurity Awareness Education: Just as Useful for Technical Users -- Salsa20 Cipher: Assigning Values to Probabilistic Neutral Key Bits -- A Versatile and Unified HQC Hardware Accelerator -- Applying Self-Recognition Biometrics to Live Deepfake Detection in Video Conferences -- GAN and DM Generated Synthetic Image Detection in the Age of Misinformation -- Extremely Simple Fail-Stop ECDSA Signatures -- Physically Unclonable Fingerprints for Authentication.
    Contained By: Springer Nature eBook
    標題: Data encryption (Computer science) - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-031-61489-7
    ISBN: 9783031614897
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9493180 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 A36 2024 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入