Information Security
27th International Conference, ISC 2024, Arlington, VA, USA, October 23¿25, 2024, Proceedings, Part I
Herausgegeben:Mouha, Nicky; Nikiforakis, Nick
Information Security
27th International Conference, ISC 2024, Arlington, VA, USA, October 23¿25, 2024, Proceedings, Part I
Herausgegeben:Mouha, Nicky; Nikiforakis, Nick
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23-25, 2024.
The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections:
Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security.
Part II - Web Security; Intrusion Detection.
- Information Security49,99 €
- Progress in Cryptology ¿ INDOCRYPT 201837,99 €
- Topics in Cryptology ¿- CT-RSA 201537,99 €
- Security and Cryptography for Networks49,99 €
- Security and Cryptography for Networks49,99 €
- Provable Security37,99 €
- Provable Security37,99 €
-
-
-
The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections:
Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security.
Part II - Web Security; Intrusion Detection.
- Produktdetails
- Lecture Notes in Computer Science 15257
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-75756-3
- Seitenzahl: 352
- Erscheinungstermin: 23. Oktober 2024
- Englisch
- Abmessung: 235mm x 155mm x 20mm
- Gewicht: 534g
- ISBN-13: 9783031757563
- ISBN-10: 3031757564
- Artikelnr.: 71729246
- Lecture Notes in Computer Science 15257
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-75756-3
- Seitenzahl: 352
- Erscheinungstermin: 23. Oktober 2024
- Englisch
- Abmessung: 235mm x 155mm x 20mm
- Gewicht: 534g
- ISBN-13: 9783031757563
- ISBN-10: 3031757564
- Artikelnr.: 71729246
.- The Formal Verification of Aptos Coin.
.- Anonymous, Timed and Revocable Proxy Signatures.
.- Symmetric-Key Cryptography.
.- MILP/MIQCP-Based Differential-Linear Cryptanalysis on CHAM-64/128.
.- Security Analysis of CMAC in the Multi-User Model.
.- Quantum Key Recovery Attacks on 4-round Iterated Even-Mansour with Two Keys.
.- Machine Learning.
.- Optimizing label-only membership inference attacks by global relative decision boundary distances.
.- Risk of Text Backdoor Attacks under Dataset Distillation.
.- Mobile Security and Trusted Execution.
.- Emulating Android Device Drivers via Borrowed Execution Context.
.- Software Security.
.- SyzLego: Enhancing Kernel Directed Greybox Fuzzing via Dependency Inference and Scheduling.
.- A Lightweight Defense Scheme against Usermode Helper Privilege Escalation Using Linux Capability.
.- Multi-Party Computation.
.- Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles.
.- ChronoCloak: An integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination.
.- Large-Plaintext Functional Bootstrapping with Small Parameters for BGV Encoding.
.- Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations.
.- Robust Multiparty Computation from Threshold Encryption Based on RLWE.
.- Efficient Blind Rotation in FHEW using Refined Decomposition and NTT.
.- Post-Quantum Cryptography.
.- Solving McEliece-1409 in One Day - Cryptanalysis with the Improved BJMM Algorithm.
.- Deep LLL on Module lattices.
.- Multi-way High-throughput Implementation of Kyber.
.- The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys.
.- A faster variant of CGL hash function via efficient backtracking checks.
.- Streamlining CSIDH: Cost-Effective Strategies for Group Actions Evaluation.
.- System Security.
.- Channel Robust Strategies with Data Augmentation for Audio Anti-Spoofing.
.- Property Guided Secure Configuration Space Search.
.- Adversarial analysis of software composition analysis tools.
.- News Reader: A News Interest Identification Attack using Single-Electrode Brainwave Signals.
.- The Formal Verification of Aptos Coin.
.- Anonymous, Timed and Revocable Proxy Signatures.
.- Symmetric-Key Cryptography.
.- MILP/MIQCP-Based Differential-Linear Cryptanalysis on CHAM-64/128.
.- Security Analysis of CMAC in the Multi-User Model.
.- Quantum Key Recovery Attacks on 4-round Iterated Even-Mansour with Two Keys.
.- Machine Learning.
.- Optimizing label-only membership inference attacks by global relative decision boundary distances.
.- Risk of Text Backdoor Attacks under Dataset Distillation.
.- Mobile Security and Trusted Execution.
.- Emulating Android Device Drivers via Borrowed Execution Context.
.- Software Security.
.- SyzLego: Enhancing Kernel Directed Greybox Fuzzing via Dependency Inference and Scheduling.
.- A Lightweight Defense Scheme against Usermode Helper Privilege Escalation Using Linux Capability.
.- Multi-Party Computation.
.- Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles.
.- ChronoCloak: An integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination.
.- Large-Plaintext Functional Bootstrapping with Small Parameters for BGV Encoding.
.- Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations.
.- Robust Multiparty Computation from Threshold Encryption Based on RLWE.
.- Efficient Blind Rotation in FHEW using Refined Decomposition and NTT.
.- Post-Quantum Cryptography.
.- Solving McEliece-1409 in One Day - Cryptanalysis with the Improved BJMM Algorithm.
.- Deep LLL on Module lattices.
.- Multi-way High-throughput Implementation of Kyber.
.- The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys.
.- A faster variant of CGL hash function via efficient backtracking checks.
.- Streamlining CSIDH: Cost-Effective Strategies for Group Actions Evaluation.
.- System Security.
.- Channel Robust Strategies with Data Augmentation for Audio Anti-Spoofing.
.- Property Guided Secure Configuration Space Search.
.- Adversarial analysis of software composition analysis tools.
.- News Reader: A News Interest Identification Attack using Single-Electrode Brainwave Signals.