Information security and cryptology ...
ICISC (Conference) (2024 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Information security and cryptology - ICISC 2024 = 27th International Conference, Seoul, South Korea, November 20-22, 2024 : revised selected papers /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Information security and cryptology - ICISC 2024/ edited by Jongsung Kim, Jungsoo Park, Wai-Kong Lee.
    Reminder of title: 27th International Conference, Seoul, South Korea, November 20-22, 2024 : revised selected papers /
    remainder title: ICISC 2024
    other author: Kim, Jongsung.
    corporate name: ICISC (Conference)
    Published: Singapore :Springer Nature Singapore : : 2025.,
    Description: xiii, 488 p. :ill. (chiefly color), digital ;24 cm.
    [NT 15003449]: Exploring the Optimal Differential Characteristics of SM4: Improving Automatic Search by Including Human Insights. -- Investigation of the Optimal Linear Characteristics of BAKSHEESH. -- Designated-Verifier Ring Signatures: Strong Definitions, Generic Constructions and Efficient Instantiations. -- Tightly Secure Lattice-based Synchronized Aggregate Signature in Standard Model. -- FineDReaM : A Boolean Query Searchable KP-ABE-Based Fine-Grained Authorized Encrypted-Data Retrieval Mechanism. -- A Formal Treatment of Envelope Encryption. -- Efficient Privacy-Preserving Counting Method with Homomorphic Encryption. -- Experimental Analysis of the Optimization-based Factorization Algorithm. -- Fast Private Set Intersection from Polynomial Multiplication Triples. -- Enhancing Differential Fuzzing of Cryptographic Libraries with Sustainable Hybrid Fuzzing and Crypto-Specific Mutation. -- RSA Quantum Cryptanalysis: A Thorough Exploration of n-Bit Attacks and Emerging Factoring Techniques. -- Quantum Circuit for Curve25519 with Fewer Qubits. -- CS-Net: A Deep Learning-Based Analysis for the Cryptography and Steganography. -- REAF: Replacing Exponential Activation Function to Prevent Side-Channel Analysis. -- Assessment of Automotive Attack Feasibility Methods in Comparison to Railway and Aviation Methods. -- Simultaneous Multiplication Protocol based on Packed Linear Secret Sharing and its Applications. -- Reinterpreting System Calls for Enhanced IoT Malware Analysis Using Function Call Graphs. -- LUA-IoT: Let's Usably Authenticate the IoT. -- An Information-Sharing System that Guarantees the Authenticity and Privacy of Contributors. -- Malicious node identification based on behavioral statistical features and social relationships. -- LiST+: An Improved Lightweight Sharable and Traceable Secure Mobile Health System. -- Pre-trained Language Models for Alert Aggregation: Limitations and Opportunities. -- Does Ordinality in Encoding Matter for XAI? A Case Study on Explainable IDS.
    Contained By: Springer Nature eBook
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-981-96-5566-3
    ISBN: 9789819655663
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login