Applied cryptography and network sec...
ACNS (Conference) (2025 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Applied cryptography and network security = 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025 : proceedings.. Part II /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Applied cryptography and network security/ edited by Marc Fischlin, Veelasha Moonsamy.
    Reminder of title: 23rd International Conference, ACNS 2025, Munich, Germany, June 23-26, 2025 : proceedings.
    remainder title: ACNS 2025
    other author: Fischlin, Marc.
    corporate name: ACNS (Conference)
    Published: Cham :Springer Nature Switzerland : : 2025.,
    Description: xiii, 543 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Side Channels: Not So Secure TSC -- G-DBREACH Attacks: Algorithmic Techniques for Faster and Stronger Compression Side Channels -- Decompose and conquer: ZVP attacks on GLV curves -- Wolf in Sheep's Clothing: Understanding and Detecting Mobile Cloaking in Blackhat. Informatuion Security: Optimal Communication Unbalanced Private Set Union -- Negative Results on Information-theoretic Additive Randomized Encodings -- Two-party ECDSA with JavaCard-based smartcards -- MSED: A Linguistic Steganalysis Method Based on Multi-Granularity Semantic Extraction Using Dual-Mode Fusion. Privacy & Anonymity: Privately Compute the Item with Maximal Weight Sum in Set Intersection -- Algebraic Zero Knowledge Contingent Payment -- On Proofs of Plaintext Knowledge for the Joye-Libert Encryption Scheme -- AQQUA: Augmenting Quisquis with Auditability. Cryptanalysis: Security Analysis of Forward Secure Log Sealing in Journald -- Generic Security of GCM-SST -- Revisiting the attacker's knowledge in inference attacks against Searchable Symmetric Encryption -- On the Structural Properties of Toffoli Gate Composition in ARADI: Implications for Algebraic Distinguishers. Attacks & Vulnerabilities: CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations -- OCEAN: Open-World Contrastive Authorship Identification -- The Impact of SBOM Generators on Vulnerability Assessment in Python: A Comparison and a Novel Approach -- Protection Against Subversion Corruptions via Reverse Firewalls in the Plain Universal Composability Framework.
    Contained By: Springer Nature eBook
    Subject: Data encryption (Computer science) - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-031-95764-2
    ISBN: 9783031957642
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9518788 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 A36 2025 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login