Atjaunināt sīkdatņu piekrišanu

Information Security and Cryptology: 19th International Conference, Inscrypt 2023, Hangzhou, China, December 910, 2023, Revised Selected Papers, Part II 2024 ed. [Mīkstie vāki]

Edited by , Edited by
  • Formāts: Paperback / softback, 419 pages, height x width: 235x155 mm, 90 Illustrations, color; 24 Illustrations, black and white; XVII, 419 p. 114 illus., 90 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14527
  • Izdošanas datums: 25-Feb-2024
  • Izdevniecība: Springer Nature
  • ISBN-10: 981970944X
  • ISBN-13: 9789819709441
  • Mīkstie vāki
  • Cena: 69,22 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 81,44 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 419 pages, height x width: 235x155 mm, 90 Illustrations, color; 24 Illustrations, black and white; XVII, 419 p. 114 illus., 90 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 14527
  • Izdošanas datums: 25-Feb-2024
  • Izdevniecība: Springer Nature
  • ISBN-10: 981970944X
  • ISBN-13: 9789819709441
The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9–10, 2023.

The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: 
Part I: Signature; blockchain; cryptography primitive; public key cryptography; security and privacy; 
Part II: System security; cryptography engineering; cryptanalysis; short papers, posters.
System Security: Text Laundering: Mitigating Malicious Features through
Knowledge Distillation of Language Foundation Models.- An Android Malware
Detection Method Using Better API Contextual Information.- TAElog: A Novel
Transformer AutoEncoder-based Log Anomaly Detection Method.- EVFLR: Efficient
Vertical Federated Logistic Regression Based on Batch Operation.- Clustered
Federated Learning with Inference Hash Codes based Local Sensitive
Hashing.- TIA: Token Importance Transferable Attack on Vision
Transformers.- Cryptography Engineering: Hardware Acceleration of NTT-Based
Polynomial Multiplication in CRYSTALS-Kyber.- V-Curve25519: Efficient
Implementation of Curve25519 on RISC-V Architecture.- Cryptanalysis: Improved
Integral Cryptanalysis of Block Ciphers BORON and Khudr.- Automatic Search of
Linear Structure: Applications to Keccak and Ascon.- Differential-Linear
Cryptanalysis of Round-Reduced SPARX-64/128.- Improved Herrmann-Mays Attack
with Merging Variables and Lower LLL Bound.- Full Round Distinguishing and
Key-Recovery Attacks on SAND-2.- Real-time Symbolic Reasoning Framework for
Cryptojacking Detection Based on Netflow-plus Analysis.- Non-malleable Codes
from Leakage Resilient Cryptographic Primitives.- Short paper: DP-Loc: A
Differential Privacy-Based Indoor Localization Scheme with Bilateral
Privacy.- A Practical Multi-Candidate Voting Protocol on Quantum Blockchain
Adapted for Various Tally Principles.- Quantum Augmented Lattice Attack on
NTRU with Side Information.- Quantum Attacks: A View of Data Complexity on
Offline Simons Algorithm.- FaBFT: Flexible Asynchronous BFT Protocol Using
DAG.- Forward Secure Online/offline Key Policy Attribute-based Encryption
with Multi-keyword Search.- Differential Privacy Enhanced Dynamic Searchable
Symmetric Encryption for Cloud Environments.- Poster: An Efficient
Privacy-preserving Scheme for Weak Password Collection in Internet of
Things.- TRGE: A Backdoor Detection after Quantizatio.- Improved Homomorphic
Evaluation for Hash Function based on TFHE.- Power of Randomness Recovery:
Tightly CCA-Secure KEM in the QROM.- Partial Key Exposure Attack on Common
Prime RSA.- An Efficient Autonomous Path Proxy Re-Encryption without Pairing
for Cloud-assisted mHealth.