Information Security Applications
24th International Conference, WISA 2023, Jeju Island, South Korea, August 23¿25, 2023, Revised Selected Papers
Herausgegeben:Kim, Howon; Youn, Jonghee
Information Security Applications
24th International Conference, WISA 2023, Jeju Island, South Korea, August 23¿25, 2023, Revised Selected Papers
Herausgegeben:Kim, Howon; Youn, Jonghee
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the revised selected papers from the 24th International Conference on Information Security Applications, WISA 2023, held in Jeju Island, South Korea, during August 23-25, 2023. The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Cryptography; network and application security; privacy and management; attacks and defenses; post-quantum cryptography and quantum cryptanalysis.
Andere Kunden interessierten sich auch für
- Information Security Applications48,99 €
- Applied Cryptography and Network Security Workshops66,99 €
- Information Security Practice and Experience66,99 €
- Foundations and Practice of Security49,99 €
- Computer Security37,99 €
- Advancements in Smart Computing and Information Security55,99 €
- Security and Privacy in Social Networks and Big Data48,99 €
-
-
-
This book constitutes the revised selected papers from the 24th International Conference on Information Security Applications, WISA 2023, held in Jeju Island, South Korea, during August 23-25, 2023.
The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Cryptography; network and application security; privacy and management; attacks and defenses; post-quantum cryptography and quantum cryptanalysis.
The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Cryptography; network and application security; privacy and management; attacks and defenses; post-quantum cryptography and quantum cryptanalysis.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 14402
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-99-8023-9
- 1st ed. 2024
- Seitenzahl: 372
- Erscheinungstermin: 11. Januar 2024
- Englisch
- Abmessung: 235mm x 155mm x 21mm
- Gewicht: 563g
- ISBN-13: 9789819980239
- ISBN-10: 9819980232
- Artikelnr.: 69096883
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes in Computer Science 14402
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-99-8023-9
- 1st ed. 2024
- Seitenzahl: 372
- Erscheinungstermin: 11. Januar 2024
- Englisch
- Abmessung: 235mm x 155mm x 21mm
- Gewicht: 563g
- ISBN-13: 9789819980239
- ISBN-10: 9819980232
- Artikelnr.: 69096883
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Cryptography.- A New Higher Order Differential of LCB.- Bloomier filters on 3-hypergraphs.- Principal Component Analysis over the Boolean Circuit within TFHE Scheme.- A security analysis on MQ-Sign.- Network and Application Security.- Research on Security Threats Using VPN in Zero Trust Environments.- A Blockchain-based Mobile Crowdsensing and Its Incentive Mechanism.- A New Frontier in Digital Security: Verification for NFT Image using Deep Learning-based ConvNeXt Model in Quantum Blockchain.- AE-LSTM based anomaly detection system for communication over DNP 3.0.- Privacy & Management.- Systematic Evaluation of Robustness Against Model Inversion Attacks on Split Learning.- Vulnerability Assessment Framework Based on In-the-Wild Exploitability for Prioritizing Patch Application.- Patchman: Firmware Update Delivery Service Over the Blockchain for IoT Environment.- Security Risk Indicator for OpenSource Software to Measure Software Development Status.- Attacks & Defenses.- Defending AirType against Inference Attacks using 3D In-Air Keyboard Layouts: Design and Evaluation.- Robust Training for Deepfake Detection Models Against Disruption Induced Data Poisoning.- Multi-class Malware Detection via Deep Graph Convolutional Networks using TF-IDF-based Attributed Call Graphs.- OCR meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime.- Enriching Vulnerability Reports Through Automated and Augmented Description Summarization.- Cryptography.- Protecting Kernel Code Integrity with PMP on RISC-V.- Exploiting Memory Page Management in KSM for Remote Memory Deduplication Attack.- Mutation Methods for Structured Input to Enhance Path Coverage of Fuzzers.- Improved Differential-Linear Cryptanalysis of Reduced Rounds of ChaCha.- SP-Fuzz: Fuzzing soft PLC with Semi-automated Harness Synthesis.- Post-Quantum Cryptography & Quantum Cryptanalysis.- Post-Quantum Cryptography & Quantum Cryptanalysis.- PQ-DPoL: An Efficient Post-Quantum Blockchain Consensus Algorithm.- Efficient Implementation of the Classic McEliece on ARMv8 processors.- Evaluating KpqC Algorithm Submissions: A Balanced and Clean Benchmarking Approach.
Cryptography.- A New Higher Order Differential of LCB.- Bloomier filters on 3-hypergraphs.- Principal Component Analysis over the Boolean Circuit within TFHE Scheme.- A security analysis on MQ-Sign.- Network and Application Security.- Research on Security Threats Using VPN in Zero Trust Environments.- A Blockchain-based Mobile Crowdsensing and Its Incentive Mechanism.- A New Frontier in Digital Security: Verification for NFT Image using Deep Learning-based ConvNeXt Model in Quantum Blockchain.- AE-LSTM based anomaly detection system for communication over DNP 3.0.- Privacy & Management.- Systematic Evaluation of Robustness Against Model Inversion Attacks on Split Learning.- Vulnerability Assessment Framework Based on In-the-Wild Exploitability for Prioritizing Patch Application.- Patchman: Firmware Update Delivery Service Over the Blockchain for IoT Environment.- Security Risk Indicator for OpenSource Software to Measure Software Development Status.- Attacks & Defenses.- Defending AirType against Inference Attacks using 3D In-Air Keyboard Layouts: Design and Evaluation.- Robust Training for Deepfake Detection Models Against Disruption Induced Data Poisoning.- Multi-class Malware Detection via Deep Graph Convolutional Networks using TF-IDF-based Attributed Call Graphs.- OCR meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime.- Enriching Vulnerability Reports Through Automated and Augmented Description Summarization.- Cryptography.- Protecting Kernel Code Integrity with PMP on RISC-V.- Exploiting Memory Page Management in KSM for Remote Memory Deduplication Attack.- Mutation Methods for Structured Input to Enhance Path Coverage of Fuzzers.- Improved Differential-Linear Cryptanalysis of Reduced Rounds of ChaCha.- SP-Fuzz: Fuzzing soft PLC with Semi-automated Harness Synthesis.- Post-Quantum Cryptography & Quantum Cryptanalysis.- Post-Quantum Cryptography & Quantum Cryptanalysis.- PQ-DPoL: An Efficient Post-Quantum Blockchain Consensus Algorithm.- Efficient Implementation of the Classic McEliece on ARMv8 processors.- Evaluating KpqC Algorithm Submissions: A Balanced and Clean Benchmarking Approach.