Information Security (eBook, PDF)
27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part I
Redaktion: Mouha, Nicky; Nikiforakis, Nick
Alle Infos zum eBook verschenken
Information Security (eBook, PDF)
27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part I
Redaktion: Mouha, Nicky; Nikiforakis, Nick
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23-25, 2024.
The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections:
Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security.
Part II - Web Security; Intrusion Detection.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 12.61MB
- Information Security (eBook, PDF)53,95 €
- Information Security and Cryptology (eBook, PDF)40,95 €
- Detection of Intrusions and Malware, and Vulnerability Assessment (eBook, PDF)40,95 €
- Codes, Cryptology and Information Security (eBook, PDF)40,95 €
- Information Security and Privacy (eBook, PDF)40,95 €
- Progress in Cryptology - AFRICACRYPT 2014 (eBook, PDF)40,95 €
- Principles of Security and Trust (eBook, PDF)40,95 €
-
-
-
The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections:
Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security.
Part II - Web Security; Intrusion Detection.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Springer Nature Switzerland
- Seitenzahl: 336
- Erscheinungstermin: 22. Oktober 2024
- Englisch
- ISBN-13: 9783031757570
- Artikelnr.: 72240849
- Verlag: Springer Nature Switzerland
- Seitenzahl: 336
- Erscheinungstermin: 22. Oktober 2024
- Englisch
- ISBN-13: 9783031757570
- Artikelnr.: 72240849
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
.- The Formal Verification of Aptos Coin.
.- Anonymous, Timed and Revocable Proxy Signatures.
.- Symmetric-Key Cryptography.
.- MILP/MIQCP-Based Differential-Linear Cryptanalysis on CHAM-64/128.
.- Security Analysis of CMAC in the Multi-User Model.
.- Quantum Key Recovery Attacks on 4-round Iterated Even-Mansour with Two Keys.
.- Machine Learning.
.- Optimizing label-only membership inference attacks by global relative decision boundary distances.
.- Risk of Text Backdoor Attacks under Dataset Distillation.
.- Mobile Security and Trusted Execution.
.- Emulating Android Device Drivers via Borrowed Execution Context.
.- Software Security.
.- SyzLego: Enhancing Kernel Directed Greybox Fuzzing via Dependency Inference and Scheduling.
.- A Lightweight Defense Scheme against Usermode Helper Privilege Escalation Using Linux Capability.
.- Multi-Party Computation.
.- Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles.
.- ChronoCloak: An integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination.
.- Large-Plaintext Functional Bootstrapping with Small Parameters for BGV Encoding.
.- Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations.
.- Robust Multiparty Computation from Threshold Encryption Based on RLWE.
.- Efficient Blind Rotation in FHEW using Refined Decomposition and NTT.
.- Post-Quantum Cryptography.
.- Solving McEliece-1409 in One Day - Cryptanalysis with the Improved BJMM Algorithm.
.- Deep LLL on Module lattices.
.- Multi-way High-throughput Implementation of Kyber.
.- The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys.
.- A faster variant of CGL hash function via efficient backtracking checks.
.- Streamlining CSIDH: Cost-Effective Strategies for Group Actions Evaluation.
.- System Security.
.- Channel Robust Strategies with Data Augmentation for Audio Anti-Spoofing.
.- Property Guided Secure Configuration Space Search.
.- Adversarial analysis of software composition analysis tools.
.- News Reader: A News Interest Identification Attack using Single-Electrode Brainwave Signals.
.- The Formal Verification of Aptos Coin.
.- Anonymous, Timed and Revocable Proxy Signatures.
.- Symmetric-Key Cryptography.
.- MILP/MIQCP-Based Differential-Linear Cryptanalysis on CHAM-64/128.
.- Security Analysis of CMAC in the Multi-User Model.
.- Quantum Key Recovery Attacks on 4-round Iterated Even-Mansour with Two Keys.
.- Machine Learning.
.- Optimizing label-only membership inference attacks by global relative decision boundary distances.
.- Risk of Text Backdoor Attacks under Dataset Distillation.
.- Mobile Security and Trusted Execution.
.- Emulating Android Device Drivers via Borrowed Execution Context.
.- Software Security.
.- SyzLego: Enhancing Kernel Directed Greybox Fuzzing via Dependency Inference and Scheduling.
.- A Lightweight Defense Scheme against Usermode Helper Privilege Escalation Using Linux Capability.
.- Multi-Party Computation.
.- Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles.
.- ChronoCloak: An integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination.
.- Large-Plaintext Functional Bootstrapping with Small Parameters for BGV Encoding.
.- Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations.
.- Robust Multiparty Computation from Threshold Encryption Based on RLWE.
.- Efficient Blind Rotation in FHEW using Refined Decomposition and NTT.
.- Post-Quantum Cryptography.
.- Solving McEliece-1409 in One Day - Cryptanalysis with the Improved BJMM Algorithm.
.- Deep LLL on Module lattices.
.- Multi-way High-throughput Implementation of Kyber.
.- The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys.
.- A faster variant of CGL hash function via efficient backtracking checks.
.- Streamlining CSIDH: Cost-Effective Strategies for Group Actions Evaluation.
.- System Security.
.- Channel Robust Strategies with Data Augmentation for Audio Anti-Spoofing.
.- Property Guided Secure Configuration Space Search.
.- Adversarial analysis of software composition analysis tools.
.- News Reader: A News Interest Identification Attack using Single-Electrode Brainwave Signals.