Atjaunināt sīkdatņu piekrišanu

E-grāmata: Foundations and Practice of Security: 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 13877
  • Izdošanas datums: 31-Mar-2023
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031301223
Citas grāmatas par šo tēmu:
  • Formāts - EPUB+DRM
  • Cena: 83,27 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 13877
  • Izdošanas datums: 31-Mar-2023
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031301223
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 15th International Symposium on Foundations and Practice of Security, FPS 2022, held in Ottawa, ON, Canada, during December 12–14, 2022.

The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers.
Cryptography.- Security Analysis of Improved EDHOC Protocol.- A Survey
on Identity-based Blind Signature.- Do Not Rely on Clock Randomization: A
Side-Channel Attack on a Protected Hardware Implementation of
AES.- Post-Quantum and UC-secure Oblivious Transfer from SPHF with
Grey Zone.- A New Class of Trapdoor Verifiable Delay Functions.- Practical
homomorphic evaluation of block-cipher-based hash functions
with applications.- Towards a maturity model for crypto-agility
assessment.- Machine Learning.- Reducing the Cost of Machine Learning
Differential Attacks Using Bit Selection and a Partial
ML-Distinguisher.- Data-driven Evaluation of Intrusion Detectors : a
Methodological Framework.- CHIEFS: Corneal-Specular Highlights Imaging for
Enhancing Fake-Face Spotter.- Cybercrime and Privacy.- Where is The Python
Interpreter?.- Automating Device Fingerprinting Attacks in 4G and5G NSA
Mobile Networks.- Malicious Human Behaviour in Information System Security:
Contribution to a Threat Model for Event Detection Algorithms.- A Taxonomy
and Gap-analysis in Digital Privacy Education.- Differentially Private
Friends Recommendation.- Physical-layer Security.- Underwater Confidential
Communications in JANUS.- Defense Models for Data Recovery in Industrial
Control Systems.- SCADA Radio Blackbox Reverse
Engineering.- Blockchain.- Finding Unchecked Low-Level Calls with Zero False
Positives and Negatives in Ethereum Smart Contracts.- Decentralized
Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart
Contracts.- Money Transfer on Transaction Signature-based Ledger.- A
Decentralized Mnemonic Backup System for Non-Custodial
Cryptocurrency Wallets.- IoT and Security Protocols.- If-This-Then-Allow-That
(to Phone Home): A Trigger-Based NetworkPolicy Enforcement Framework for
Smart Homes.- Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2
One-Time Passwords.- Towards Characterizing IoT Software Update
Practices.- Two-Layer Architecture for Signature-Based Attacks Detection over
Encrypted Network Traffic.- Short Papers.- A Decision-Support Tool for
Experimentation on Zero-Hour Phishing Detection.- Deep-Learning-Based
Vulnerability Detection in Binary Executables.- Robustness of Affine and
Extended Affine Equivalent Surjective S-Box(es) against Differential
Cryptanalysis.