Atjaunināt sīkdatņu piekrišanu

E-grāmata: Information Security: 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 13640
  • Izdošanas datums: 09-Dec-2022
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031223907
  • Formāts - EPUB+DRM
  • Cena: 83,27 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 13640
  • Izdošanas datums: 09-Dec-2022
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031223907

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022.

The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.

Cryptography.- Privacy Preserving Computation in Cloud Using Reusable
Garbled Oblivious RAMs.- Efficient Private Set Intersection Cardinality
Protocol in the Reverse Unbalanced Setting.- Crypto-Steganographic Validity
for Additive Manufacturing (3D Printing) Design Files.- Witness Encryption
from Smooth Projective Hashing System.- Post-Quantum Cryptography.- More
Efficient Adaptively Secure Lattice-based IBE with Equality Test in the
Standard Model.- QUIC Protocol with Post-Quantum Authentication.- Batched
Fully Homomorphic Encryption from TFHE.- Implicit Rejection in
Fujisaki-Okamoto: Framework and a Novel Realization.- Cryptanalysis.- Further
Cryptanalysis of a Type of RSA Variants.- The SAT-Based Automatic Searching
and Experimental Verification for Differential Characteristics with
Application to Midori64.- Efficient Scalar Multiplication on Koblitz Curves
with Pre-computation.- Blockchain.- Efficient ECDSA-based Adaptor Signature
for Batched Atomic Swaps.- Searching for Encrypted Data on Blockchain: An
Efficient, Secure and Fair Realization.- GRUZ : Practical Resource Fair
Exchange without Blockchain.- Daric: A Storage Efficient Payment Channel With
Punishment Mechanism.- A Blockchain-based Mutual Authentication Protocol for
Smart Home.- Email and Web Security.- OblivSend: Secure and Ephemeral File
Sharing Services with Oblivious Expiration Control.- EarlyCrow: Detecting APT
Malware Command and Control Over HTTP(S) Using Contextual
Summaries.- Malware.- ATLAS: A Practical Attack Detection and Live Malware
Analysis System for IoT Threat Intelligence.- Dissecting Applications
Uninstallers & Removers: Are they effective?.- Representing LLVM-IR in a Code
Property Graph.- Why we need a theory of maliciousness: Hardware Performance
Counters in security.- Anatomist: Enhanced Firmware Vulnerability Discovery
Based on Program State Abnormality Determination With Whole-system
Replay.- AI Security.- AspIOC: Aspect-Enhanced Deep Neural Network for
Actionable Indicator of Compromise Recognition.- HeHe: Balancing the Privacy
and Efficiency in Training CNNs over the Semi-honest Cloud.- Deep Learning
Assisted Key Recovery Attack for Round-Reduced Simeck32/64.- CFL: Cluster
Federated Learning in Large-scale Peer-to-Peer Networks.- Bilateral
Privacy-Preserving Task Assignment with Personalized Participant Selection
for Mobile Crowdsensing.- Communication-Efficient and Secure Federated
Learning Based on AdaptiveOne-bit Compressed Sensing.