Information Systems Security (eBook, PDF)
19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings
Redaktion: Muthukkumarasamy, Vallipuram; Shyamasundar, Rudrapatna K.; Sudarsan, Sithu D.
Alle Infos zum eBook verschenken
Information Systems Security (eBook, PDF)
19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings
Redaktion: Muthukkumarasamy, Vallipuram; Shyamasundar, Rudrapatna K.; Sudarsan, Sithu D.
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the19th International Conference on Information Systems Security, ICISS 2023, held in Raipur, India, during December 16-20, 2023. The 18 full papers and 10 short papers included in this book were carefully reviewed and selected from 78 submissions. They are organized in topical sections as follows: systems security, network security, security in AI/ML, privacy, cryptography, blockchains.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 30.4MB
- Information Security and Privacy (eBook, PDF)73,95 €
- Cyber Security, Cryptology, and Machine Learning (eBook, PDF)53,95 €
- Information Systems Security (eBook, PDF)40,95 €
- Security and Privacy in Communication Networks (eBook, PDF)40,95 €
- Security and Privacy in Communication Networks (eBook, PDF)73,95 €
- Applied Cryptography and Network Security Workshops (eBook, PDF)53,95 €
- Mobile Internet Security (eBook, PDF)57,95 €
-
-
-
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 482
- Erscheinungstermin: 8. Dezember 2023
- Englisch
- ISBN-13: 9783031490996
- Artikelnr.: 69699159
- Verlag: Springer International Publishing
- Seitenzahl: 482
- Erscheinungstermin: 8. Dezember 2023
- Englisch
- ISBN-13: 9783031490996
- Artikelnr.: 69699159
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
A Security Analysis of Password Managers on Android.
The Design and Application of a Unified Ontology for Cyber Security.
Big Data Forensics on Apache Kafka.
A Survey on Security Threats and Mitigation Strategies for NoSQL Databases MongoDB as a Use Case.
Theoretical Enumeration of Deployable Single
output Strong PUF Instances based on Uniformity and Uniqueness Constraints.
Network Security.
Detection and Hardening Strategies to Secure an Enterprise Network.
Attack Graph Based Security Metrics For Dynamic Networks.
An Energy
conscious surveillance scheme for intrusion detection in underwater sensor networks using Tunicate swarm optimization.
Security in AI/ML.
STN
Net: A Robust GAN
Generated Face Detector.
MDLDroid: Multimodal Deep Learning based Android Malware Detection.
A Cycle
GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks.
Secure KNN Computation On Cloud.
A Multi
Stage Multi
Modal Classification Model for DeepFakes Combining Deep Learned and Computer Vision Oriented Features.
Privacy.
Security and Privacy in Machine Learning.
Attack on the Privacy
Preserving Carpooling Service TAROT.
Democracy in Your Hands!: Practical Multi
Key Homomorphic E
Voting.
Cryptography.
Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing.
Verifiable Timed Accountable Subgroup Multi
signatures.
Verifiable Timed Accountable Subgroup Multi
signatures.
Blockchains.
Ensuring Data Security in the Context of IoT Forensics Evidence Preservation with Blockchain and Self
Sovereign Identities.
Analysis of Optimal Number of Shards using ShardEval, A Simulator for Sharded Blockchains.
SoK: Digital Signatures and Taproot Transactions in Bitcoin.
BCTPV
NIZK: Publicly
verifiable non
interactive zero
knowledge proof system from minimal blockchain assumptions.
Proof
of
Variable
Authority: A blockchain consensus mechanism for securing IoT networks.
An Efficient Two
Party ECDSA Scheme for Cryptocurrencies.
Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology.
Crypto
Ransomware Detection: A Honey
file based approach using chi
square test.
PSDP: Blockchain
Based Computationally Efficient Provably Secure Data Possession.
Private and Verifiable Inter
bank Transactions and Settlements on Blockchain.
A Security Analysis of Password Managers on Android.
The Design and Application of a Unified Ontology for Cyber Security.
Big Data Forensics on Apache Kafka.
A Survey on Security Threats and Mitigation Strategies for NoSQL Databases MongoDB as a Use Case.
Theoretical Enumeration of Deployable Single
output Strong PUF Instances based on Uniformity and Uniqueness Constraints.
Network Security.
Detection and Hardening Strategies to Secure an Enterprise Network.
Attack Graph Based Security Metrics For Dynamic Networks.
An Energy
conscious surveillance scheme for intrusion detection in underwater sensor networks using Tunicate swarm optimization.
Security in AI/ML.
STN
Net: A Robust GAN
Generated Face Detector.
MDLDroid: Multimodal Deep Learning based Android Malware Detection.
A Cycle
GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks.
Secure KNN Computation On Cloud.
A Multi
Stage Multi
Modal Classification Model for DeepFakes Combining Deep Learned and Computer Vision Oriented Features.
Privacy.
Security and Privacy in Machine Learning.
Attack on the Privacy
Preserving Carpooling Service TAROT.
Democracy in Your Hands!: Practical Multi
Key Homomorphic E
Voting.
Cryptography.
Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing.
Verifiable Timed Accountable Subgroup Multi
signatures.
Verifiable Timed Accountable Subgroup Multi
signatures.
Blockchains.
Ensuring Data Security in the Context of IoT Forensics Evidence Preservation with Blockchain and Self
Sovereign Identities.
Analysis of Optimal Number of Shards using ShardEval, A Simulator for Sharded Blockchains.
SoK: Digital Signatures and Taproot Transactions in Bitcoin.
BCTPV
NIZK: Publicly
verifiable non
interactive zero
knowledge proof system from minimal blockchain assumptions.
Proof
of
Variable
Authority: A blockchain consensus mechanism for securing IoT networks.
An Efficient Two
Party ECDSA Scheme for Cryptocurrencies.
Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology.
Crypto
Ransomware Detection: A Honey
file based approach using chi
square test.
PSDP: Blockchain
Based Computationally Efficient Provably Secure Data Possession.
Private and Verifiable Inter
bank Transactions and Settlements on Blockchain.