| 紀錄類型: |
書目-電子資源
: Monograph/item
|
| 正題名/作者: |
Information security and cryptology - ICISC 2024/ edited by Jongsung Kim, Jungsoo Park, Wai-Kong Lee. |
| 其他題名: |
27th International Conference, Seoul, South Korea, November 20-22, 2024 : revised selected papers / |
| 其他題名: |
ICISC 2024 |
| 其他作者: |
Kim, Jongsung. |
| 團體作者: |
ICISC (Conference) |
| 出版者: |
Singapore :Springer Nature Singapore : : 2025., |
| 面頁冊數: |
xiii, 488 p. :ill. (chiefly color), digital ;24 cm. |
| 內容註: |
Exploring the Optimal Differential Characteristics of SM4: Improving Automatic Search by Including Human Insights. -- Investigation of the Optimal Linear Characteristics of BAKSHEESH. -- Designated-Verifier Ring Signatures: Strong Definitions, Generic Constructions and Efficient Instantiations. -- Tightly Secure Lattice-based Synchronized Aggregate Signature in Standard Model. -- FineDReaM : A Boolean Query Searchable KP-ABE-Based Fine-Grained Authorized Encrypted-Data Retrieval Mechanism. -- A Formal Treatment of Envelope Encryption. -- Efficient Privacy-Preserving Counting Method with Homomorphic Encryption. -- Experimental Analysis of the Optimization-based Factorization Algorithm. -- Fast Private Set Intersection from Polynomial Multiplication Triples. -- Enhancing Differential Fuzzing of Cryptographic Libraries with Sustainable Hybrid Fuzzing and Crypto-Specific Mutation. -- RSA Quantum Cryptanalysis: A Thorough Exploration of n-Bit Attacks and Emerging Factoring Techniques. -- Quantum Circuit for Curve25519 with Fewer Qubits. -- CS-Net: A Deep Learning-Based Analysis for the Cryptography and Steganography. -- REAF: Replacing Exponential Activation Function to Prevent Side-Channel Analysis. -- Assessment of Automotive Attack Feasibility Methods in Comparison to Railway and Aviation Methods. -- Simultaneous Multiplication Protocol based on Packed Linear Secret Sharing and its Applications. -- Reinterpreting System Calls for Enhanced IoT Malware Analysis Using Function Call Graphs. -- LUA-IoT: Let's Usably Authenticate the IoT. -- An Information-Sharing System that Guarantees the Authenticity and Privacy of Contributors. -- Malicious node identification based on behavioral statistical features and social relationships. -- LiST+: An Improved Lightweight Sharable and Traceable Secure Mobile Health System. -- Pre-trained Language Models for Alert Aggregation: Limitations and Opportunities. -- Does Ordinality in Encoding Matter for XAI? A Case Study on Explainable IDS. |
| Contained By: |
Springer Nature eBook |
| 標題: |
Computer security - Congresses. - |
| 電子資源: |
https://doi.org/10.1007/978-981-96-5566-3 |
| ISBN: |
9789819655663 |