Linked to FindBook      Google Book      Amazon      博客來     
  • Applied cryptography and network security workshops = ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024 : proceedings.. Part II /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Applied cryptography and network security workshops/ edited by Martin Andreoni.
    Reminder of title: ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024 : proceedings.
    remainder title: ACNS 2024
    other author: Andreoni, Martin.
    corporate name: ACNS (Conference)
    Published: Cham :Springer Nature Switzerland : : 2024.,
    Description: xxi, 243 p. :ill. (chiefly col.), digital ;24 cm.
    [NT 15003449]: AAC - Workshop on Advances in Asymmetric Cryptanalysis: Forging tropical signatures -- Quantum Circuit Design for the Lee-Brickell based Information Set Decoding -- Projective Space Stern Decoding and Application to SDitH. SiMLA - Security in Machine Learning and its Applications: One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection -- Model Extraction Attack without Natural Images -- Privacy-Preserving Sentiment Analysis using Homomorphic Encryption and Attention Mechanisms -- Differential Privacy with Selected Privacy Budget ϵ in a Cyber Physical System Using Machine Learning. LEE - Low-Latency Encryption: Construction of 4 × 4 Lightweight Low-latency Involutory MDS Matrices CIMSS - Critical Infrastructure and Manufacturing System Security Guidelines for Cyber Risk Management in Autonomous Shipping Identity-based Cluster Authentication and Key Exchange (ID-CAKE) Message Broadcasting and Batch Verification in VANETs. POSTERS: One Time Chat - a toy end-to-end encrypted web messaging service -- Game Theoretic Modeling of Insider Threats in An Organization -- Smart Appliance Abnormal Electrical Power Consumption Detection -- Towards Secure 5G Infrastructures for Production Systems -- Cybersecurity Awareness Education: Just as Useful for Technical Users -- Salsa20 Cipher: Assigning Values to Probabilistic Neutral Key Bits -- A Versatile and Unified HQC Hardware Accelerator -- Applying Self-Recognition Biometrics to Live Deepfake Detection in Video Conferences -- GAN and DM Generated Synthetic Image Detection in the Age of Misinformation -- Extremely Simple Fail-Stop ECDSA Signatures -- Physically Unclonable Fingerprints for Authentication.
    Contained By: Springer Nature eBook
    Subject: Data encryption (Computer science) - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-031-61489-7
    ISBN: 9783031614897
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9493180 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 A36 2024 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login