Atjaunināt sīkdatņu piekrišanu

E-grāmata: Information and Communications Security: 25th International Conference, ICICS 2023, Tianjin, China, November 18-20, 2023, Proceedings

Edited by , Edited by , Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 14252
  • Izdošanas datums: 19-Oct-2023
  • Izdevniecība: Springer Verlag, Singapore
  • Valoda: eng
  • ISBN-13: 9789819973569
  • Formāts - PDF+DRM
  • Cena: 100,53 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 14252
  • Izdošanas datums: 19-Oct-2023
  • Izdevniecība: Springer Verlag, Singapore
  • Valoda: eng
  • ISBN-13: 9789819973569

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This volume LNCS 14252 constitutes the refereed proceedings of 25th International Conference on Information and Communications Security, ICICS 2023, held in Tianjin, China, during November 18–20, 2023.  

The 38 full papers presented together with 6 short papers were carefully reviewed and selected from 181 submissions. The conference focuses on: Symmetric-Key Cryptography; Public-Key Cryptography; Applied Cryptography; Authentication and Authorization; Privacy and Anonymity; Security and Privacy of AI; Blockchain and Cryptocurrencies; and System and Network Security.


Symmetric-Key Cryptography.- SAT-aided Differential Cryptanalysis of
Lightweight Block Ciphers Midori, MANTIS and QARMA.- Improved Related-Key
Rectangle Attack against the Full AES-192.- Block Ciphers Classification
Based on Randomness Test Statistic Value via LightGBM.- Cryptanalysis of Two
White-Box Implementations of the CLEFIA Block Cipher.- PAE: Towards More
Efficient and BBB-secure AE From a Single Public Permutation.- Public-Key
Cryptography.- A Polynomial-time Attack on G2SIDH.- Improvements of
Homomorphic Secure Evaluation of Inverse Square Root.- Oblivious Transfer
from Rerandomizable PKE.- Forward Secure Lattice-based Ring Signature Scheme
in the Standard Model.- Applied Cryptography.- Secure Multi-Party Computation
with Legally-Enforceable Fairness.- On-demand Allocation of Cryptographic
Computing Resource with Load Prediction.- Private Message Franking with After
Opening Privacy.- Semi-Honest 2-Party Faithful Truncation from Two-Bit
Extraction.- Outsourcing Verifiable Distributed Oblivious Polynomial
Evaluation from Threshold Cryptography.- Authentication and
Authorization.- PiXi: Password Inspiration by Exploring
Information.- Security Analysis of Alignment-Robust Cancelable Biometric
Scheme for Iris Verification.- A Certificateless Conditional Anonymous
Authentication Scheme for Satellite Internet of Things.- BLAC: A
Blockchain-based Lightweight Access Control Scheme in Vehicular Social
Networks.- Privacy and Anonymity.- Link Prediction-Based Multi-Identity
Recognition of Darknet Vendors.- CryptoMask: Privacy-preserving Face
Recognition.- Efficient Private Multiset ID Protocols.- Zoomer: A Website
Fingerprinting Attack against Tor Hidden Services.- An Enhanced
Privacy-preserving Hierarchical Federated Learning Framework for
IoV.- Security and Privacy of AI.- Revisiting the Deep Learning-based
Eavesdropping Attacks via Facial Dynamics from VR Motion
Sensors.- Multi-scale Features Destructive Universal Adversarial
Perturbations.- Pixel-Wise Reconstruction of Private Data in Split Federated
Learning.- Neural Network Backdoor Attacks Fully Controlled by Composite
Natural Utterance Fragments.- Black-Box Fairness Testing with Shadow
Models.- Graph Unlearning using Knowledge Distillation.- AFLOW: Developing
Adversarial Examples under Extremely Noise-limited Settings.- Learning to
Detect Deepfakes via Adaptive Attention and Constrained Difference.- A Novel
Deep Ensemble Framework for Online Signature Verification Using Temporal and
Spatial Representation.- Blockchain and Cryptocurrencies.- SCOPE: A
Cross-Chain Supervision Scheme for Consortium Blockchains.- Subsidy Bridge:
Rewarding Cross-blockchain Relayers with Subsidy.- Towards Efficient and
Privacy-Preserving Anomaly Detection of Blockchain-based Cryptocurrency
Transactions.- Blockchain based Publicly Auditable Multi-Party Computation
with Cheater Detection.- BDTS: Blockchain-based Data Trading System.- Illegal
Accounts Detection on Ethereum using Heterogeneous Graph Transformer
Networks.- System and Network security.- DRoT: A Decentralised Root of Trust
for Trusted Networks.- Finding Missing Security Operation Bugs via Program
Slicing and Differential Check.- TimeClave: Oblivious In-enclave Time series
Processing System.- Efficient and Appropriate Key Generation Scheme in
Different IoT Scenarios.- A Fake News Detection Method Based on A Multimodal
Cooperative Attention Network.