Information security and cryptology ...
ICISC (Conference) (2024 :)

FindBook      Google Book      Amazon      博客來     
  • Information security and cryptology - ICISC 2024 = 27th International Conference, Seoul, South Korea, November 20-22, 2024 : revised selected papers /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Information security and cryptology - ICISC 2024/ edited by Jongsung Kim, Jungsoo Park, Wai-Kong Lee.
    其他題名: 27th International Conference, Seoul, South Korea, November 20-22, 2024 : revised selected papers /
    其他題名: ICISC 2024
    其他作者: Kim, Jongsung.
    團體作者: ICISC (Conference)
    出版者: Singapore :Springer Nature Singapore : : 2025.,
    面頁冊數: xiii, 488 p. :ill. (chiefly color), digital ;24 cm.
    內容註: Exploring the Optimal Differential Characteristics of SM4: Improving Automatic Search by Including Human Insights. -- Investigation of the Optimal Linear Characteristics of BAKSHEESH. -- Designated-Verifier Ring Signatures: Strong Definitions, Generic Constructions and Efficient Instantiations. -- Tightly Secure Lattice-based Synchronized Aggregate Signature in Standard Model. -- FineDReaM : A Boolean Query Searchable KP-ABE-Based Fine-Grained Authorized Encrypted-Data Retrieval Mechanism. -- A Formal Treatment of Envelope Encryption. -- Efficient Privacy-Preserving Counting Method with Homomorphic Encryption. -- Experimental Analysis of the Optimization-based Factorization Algorithm. -- Fast Private Set Intersection from Polynomial Multiplication Triples. -- Enhancing Differential Fuzzing of Cryptographic Libraries with Sustainable Hybrid Fuzzing and Crypto-Specific Mutation. -- RSA Quantum Cryptanalysis: A Thorough Exploration of n-Bit Attacks and Emerging Factoring Techniques. -- Quantum Circuit for Curve25519 with Fewer Qubits. -- CS-Net: A Deep Learning-Based Analysis for the Cryptography and Steganography. -- REAF: Replacing Exponential Activation Function to Prevent Side-Channel Analysis. -- Assessment of Automotive Attack Feasibility Methods in Comparison to Railway and Aviation Methods. -- Simultaneous Multiplication Protocol based on Packed Linear Secret Sharing and its Applications. -- Reinterpreting System Calls for Enhanced IoT Malware Analysis Using Function Call Graphs. -- LUA-IoT: Let's Usably Authenticate the IoT. -- An Information-Sharing System that Guarantees the Authenticity and Privacy of Contributors. -- Malicious node identification based on behavioral statistical features and social relationships. -- LiST+: An Improved Lightweight Sharable and Traceable Secure Mobile Health System. -- Pre-trained Language Models for Alert Aggregation: Limitations and Opportunities. -- Does Ordinality in Encoding Matter for XAI? A Case Study on Explainable IDS.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-981-96-5566-3
    ISBN: 9789819655663
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入