Atnaujinkite slapukų nuostatas

Applications and Techniques in Information Security: 8th International Conference, ATIS 2017, Auckland, New Zealand, July 67, 2017, Proceedings 1st ed. 2017 [Minkštas viršelis]

Edited by , Edited by , Edited by , Edited by
  • Formatas: Paperback / softback, 223 pages, aukštis x plotis: 235x155 mm, weight: 3693 g, 68 Illustrations, black and white; XIV, 223 p. 68 illus., 1 Paperback / softback
  • Serija: Communications in Computer and Information Science 719
  • Išleidimo metai: 24-Jun-2017
  • Leidėjas: Springer Verlag, Singapore
  • ISBN-10: 9811054207
  • ISBN-13: 9789811054204
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 223 pages, aukštis x plotis: 235x155 mm, weight: 3693 g, 68 Illustrations, black and white; XIV, 223 p. 68 illus., 1 Paperback / softback
  • Serija: Communications in Computer and Information Science 719
  • Išleidimo metai: 24-Jun-2017
  • Leidėjas: Springer Verlag, Singapore
  • ISBN-10: 9811054207
  • ISBN-13: 9789811054204
Kitos knygos pagal šią temą:
This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017. 
The 14 revised full papers and 4 short papers presented together with two abstracts of invited talks were carefully reviewed and selected from 29 submissions. 
The papers are organized in topical sections on Keynote Speeches; Crypto Algorithms and Applications; Attacks; Malware and Malicious Events Detection; System and Network Security.
Crypto Algorithms and Applications
Defeating Plausible Deniability of VeraCrypt Hidden Operating Systems
3(11)
Michal Kedziora
Yang-Wai Chow
Willy Susilo
Security Analysis of a Design Variant of Randomized Hashing
14(9)
Praveen Gauravaram
Shoichi Hirose
Douglas Stebila
Secure Two-Party Computation Using an Efficient Garbled Circuit by Reducing Data Transfer
23(12)
Mohammad Hossein Yalame
Mohammad Hossein Farzam
Siavash Bayat-Sarmadi
An Efficient Non-transferable Proxy Re-encryption Scheme
35(13)
S. Sharmila Deva Selvi
Arinjita Paul
C. Pandu Rangan
Rounding Technique's Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce
48(10)
Wenjie Qin
Kewei Lv
On the Practical Implementation of Impossible Differential Cryptanalysis on Reduced-Round AES
58(17)
Sourya Kakarla
Srinath Mandava
Dhiman Saha
Dipanwita Roy Chowdhury
Privacy Preserving Techniques
Private Distributed Three-Party Learning of Gaussian Mixture Models
75(13)
Kaleb L. Leemaqz
Sharon X. Lee
Geoffrey J. McLachlan
A Privacy Preserving Platform for MapReduce
88(12)
Sibghat Ullah Bazai
Julian Jang-Jaccard
Xuyun Zhang
Privacy-Preserving Deep Learning: Revisited and Enhanced
100(13)
Le Trieu Phong
Yoshinori Aono
Takuya Hayashi
Lihua Wang
Shiho Moriai
Attacks
Characterizing Promotional Attacks in Mobile App Store
113(15)
Bo Sun
Xiapu Luo
Mitsuaki Akiyama
Takuya Watanabe
Tatsuya Mori
Low-Data Complexity Attacks on Camellia
128(13)
Takeru Koie
Takanori Isobe
Yosuke Todo
Masakatu Morii
RESTful Is Not Secure
141(16)
Tetiana Yarygina
Malware and Malicious Events Detection
UnitecDEAMP: Flow Feature Profiling for Malicious Events Identification in Darknet Space
157(12)
Ruibin Zhang
Chi Yang
Shaoning Pang
Hossein Sarrafzadeh
A Hybrid Approach for Malware Family Classification
169(12)
Naqqash Aman
Yasir Saleem
Fahim H. Abbasi
Farrukh Shahzad
Low-Complexity Signature-Based Malware Detection for IoT Devices
181(12)
Muhamed Fauzi Bin Abbas
Thambipillai Srikanthan
System and Network Security
De-anonymous and Anonymous Technologies for Network Traffic Release
193(8)
Xiang Tian
Yu Wang
Yujia Zhu
Yong Sun
Qingyun Liu
Privacy-Aware Authentication for Wi-Fi Based Indoor Positioning Systems
201(13)
Sang Guun Yoo
Jhonattan J. Barriga
On the Effectiveness of Non-readable Executable Memory Against BROP
214(9)
Christian Otterstad
Author Index 223