Information security applications = ...
WISA (Workshop : Information security) (2019 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Information security applications = 20th International Conference, WISA 2019, Jeju Island, South Korea, August 21-24, 2019 : revised selected papers /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Information security applications/ edited by Ilsun You.
    Reminder of title: 20th International Conference, WISA 2019, Jeju Island, South Korea, August 21-24, 2019 : revised selected papers /
    remainder title: WISA 2019
    other author: You, Ilsun.
    corporate name: WISA (Workshop : Information security)
    Published: Cham :Springer International Publishing : : 2020.,
    Description: xiii, 384 p. :ill., digital ;24 cm.
    [NT 15003449]: Show me your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM -- Turn On the Lights: User Behavior in Game Environment Using CPTED -- QR Code Watermarking for Digital Images -- FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking -- DroPPP: A P4 Approach to Mitigating DoS Attacks in SDN -- A Secure and Self-Tallying E-Voting System Based on Blockchain -- An Extended CTRT for AES-256 -- A Blind Ring Signature Based on the Short Integer Solution Problem -- A Note on the Invisibility and Anonymity of Undeniable Signature Schemes -- Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR -- Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNSS) -- CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network -- A New Password Cracking Model with Generative Adversarial Networks -- Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing -- Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression -- Timed-Release Encryption with Master Time Bound Key -- Is it Possible to Hide My Key into Deep Neural Network -- RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices -- On the Automation of Security Testing for IoT Constrained Scenarios -- Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments -- Secret Sharing on Evolving Multi-Level Access Structure -- Strengthened PAKE Protocols Secure Against Malicious Private Key Generator -- Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof -- Ring-LWE on 8-bit AVR Embedded Processor -- Low-Noise LLC Side-Channel Attack with Perf -- Optimized SIKE Round 2 on 64-bit ARM -- Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea -- An SGX-Based Key Management Framework for Data Centric Networking -- Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR.
    Contained By: Springer eBooks
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-030-39303-8
    ISBN: 9783030393038
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9390451 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 W57 2019 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login