Atjaunināt sīkdatņu piekrišanu

E-grāmata: Information Security Applications: 20th International Conference, WISA 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers

Edited by
  • Formāts: EPUB+DRM
  • Sērija : Security and Cryptology 11897
  • Izdošanas datums: 24-Jan-2020
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030393038
  • Formāts - EPUB+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Sērija : Security and Cryptology 11897
  • Izdošanas datums: 24-Jan-2020
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030393038

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Information Security Applications, WISA 2019, held on Jeju Island, South Korea, in August 2019. The 29 revised full papers presented in this volume were carefully reviewed and selected from 63 submissions.





The primary focus of WISA 2019 was on systems and network security including all other technical and practical aspects of security application in general. The papers are grouped in the following topical sections: Application and Game Security; Network Security and Blockchain; Cryptography; Security with AI and Machine Learning; IoT Security; Hardware Security; and Selected Security Issues.
Show me your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM.- Turn On the Lights: User Behavior in Game Environment Using CPTED.- QR Code Watermarking for Digital Images.- FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking.- DroPPP: A P4 Approach to Mitigating DoS Attacks in SDN.- A Secure and Self-Tallying E-Voting System Based on Blockchain.- An Extended CTRT for AES-256.- A Blind Ring Signature Based on the Short Integer Solution Problem.- A Note on the Invisibility and Anonymity of Undeniable Signature Schemes.- Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR.- Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNSS).- CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network.- A New Password Cracking Model with Generative Adversarial Networks.- Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing.- Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression.- Timed-Release Encryption with Master Time Bound Key.- Is it Possible to Hide My Key into Deep Neural Network.- RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices.- On the Automation of Security Testing for IoT Constrained Scenarios.- Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments.- Secret Sharing on Evolving Multi-Level Access Structure.- Strengthened PAKE Protocols Secure Against Malicious Private Key Generator.- Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof.- Ring-LWE on 8-bit AVR Embedded Processor.- Low-Noise LLC Side-Channel Attack with Perf.- Optimized SIKE Round 2 on 64-bit ARM.- Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea.- An SGX-Based Key Management Framework for Data Centric Networking.- Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR.