Information and communications secur...
Katsikas, Sokratis K.

Linked to FindBook      Google Book      Amazon      博客來     
  • Information and communications security = 26th International Conference, ICICS 2024, Mytilene, Greece, August 26-28, 2024 : proceedings.. Part II /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Information and communications security/ edited by Sokratis Katsikas ... [et al.].
    Reminder of title: 26th International Conference, ICICS 2024, Mytilene, Greece, August 26-28, 2024 : proceedings.
    remainder title: ICICS 2024
    other author: Katsikas, Sokratis K.
    corporate name: ICICS (Conference)
    Published: Singapore :Springer Nature Singapore : : 2025.,
    Description: xvi, 334 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Crypto & Applied crypto. -- TorHunter: A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic through Unsupervised Pre-training. -- Two-round Post-quantum Private Equality Test and OT from RLWE-encryption. -- Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing. -- FAMC: Fair and Publicly Auditable Multi-Party Computation with Cheater Detection. -- Homomorphic encryption. -- X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts. -- Amortized Functional Bootstrapping for Homomorphic Evaluation of Encrypted Functions. - Tightly Secure Linearly Homomorphic Signature Schemes for Subspace Under DL Assumption in AGM. -- Key agreement protocols and digital signature schemes. -- CoDPoC IP:A Configurable Data Protection Circuit to Support Multiple Key Agreement Scheme. -- Formal analysis of Julia Key Agreement Protocol. -- New Construction of Code-Based Signature Schemes. -- Identity-Based Signature from Lattices without Trapdoors. -- Defences. -- The Emperor is Now Clothed: A Secure Web Governance Framework for User Authentication Between Password Managers and Web Apps. -- HoneyLLM: A Large Language Model-Powered Medium-interaction Honeypot. -- TSR-jack: An In-Browser Crypto-jacking Detection Method Based on Time Series Representation Learning. -- Don't Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational Databases. -- FirmPorter: Porting RTOSes at the Binary Level for Firmware Re-hosting.
    Contained By: Springer Nature eBook
    Subject: Cryptography - Congresses. -
    Online resource: https://doi.org/10.1007/978-981-97-8801-9
    ISBN: 9789819788019
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login