Information security and privacy = 3...
ACISP (Conference) (2025 :)

FindBook      Google Book      Amazon      博客來     
  • Information security and privacy = 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025 : proceedings.. Part III /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Information security and privacy/ edited by Willy Susilo, Josef Pieprzyk.
    其他題名: 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025 : proceedings.
    其他題名: ACISP 2025
    其他作者: Susilo, Willy.
    團體作者: ACISP (Conference)
    出版者: Singapore :Springer Nature Singapore : : 2025.,
    面頁冊數: xv, 484 p. :ill. (some col.), digital ;24 cm.
    內容註: Privacy Enhancing Technologies. -- Comparing and Improving Frequency Estimation Perturbation Mechanisms under Local Differential Privacy. -- Strong Federated Authentication With Password-based Credential Against Identity Server Corruption. -- Anonymous Credentials with Credential Redaction and Its Application to SSI-based Plug Charge for Shared Vehicles. -- Direction-Oriented Smooth Sensitivity and Its Application to Genomic Statistical Analysis. -- Sentence Embedding Generation Method for Differential Privacy Protection. KD-IBMRKE-PPFL: A Privacy-Preserving Federated Learning Framework Integrating Knowledge Distillation and Identity-Based Multi-Receiver Key Encapsulation. -- AI Security and Privacy. -- Identifying the Truth of Global Model: A Generic Solution to Defend Against Byzantine and Backdoor Attacks in Federated Learning. -- RAGLeak: Membership Inference Attacks on RAG-Based Large Language Models. -- DeGain: Detecting GAN-based Data Inversion in Collaborative Deep Learning. -- FRFL: Fair and Robust Federated Learning Incentive Model Based on Game Theory. -- DPFedSub: A Differentially Private Federated Learning with Randomized Subspace Descend. -- MG-Det: Deepfake Detection with Multi-Granularity. -- LPIA: Label Preference Inference Attack against Federated Graph Learning. -- DARA: Enhancing Vulnerability Alignment via Adaptive Reconstruction and Dual-Level Attention. -- Zeroth-Order Federated Private Tuning for Pretrained Large Language Models. -- Understanding the Robustness of Machine-Unlearning Models. -- System Security. -- Mitigating the Unprivileged User Namespaces based Privilege Escalation Attacks with Linux Capabilities. -- SoK: From Systematization to Best Practices in Fuzz Driver Generation. -- Facial Authentication Security Evaluation against Deepfake Attacks in Mobile Apps. -- Short Papers. -- EAPIR: Efficient and Authenticated Private Information Retrieval with Fast Server Processing. -- Ransomware Encryption Detection: Adaptive File System Analysis Against Evasive Encryption Tactics. -- Receiver-initiated Updatable Public Key Encryption: Construction, Security and Application. -- Robust and Privacy-Preserving Dynamic Average Consensus with Individual Weight. -- Improving RSA Cryptanalysis: Combining Continued Fractions and Coppersmith's Techniques. -- Shortest Printable Shellcode Encoding Algorithm Based on Dynamic Bitwidth Selection. -- Position Paper. -- Bridging Clone Detection and Industrial Compliance: A Practical Pipeline for Enterprise Codebases.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-981-96-9101-2
    ISBN: 9789819691012
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入