Atnaujinkite slapukų nuostatas

El. knyga: Information Security: 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formatas: EPUB+DRM
  • Serija: Lecture Notes in Computer Science 13640
  • Išleidimo metai: 09-Dec-2022
  • Leidėjas: Springer International Publishing AG
  • Kalba: eng
  • ISBN-13: 9783031223907
  • Formatas: EPUB+DRM
  • Serija: Lecture Notes in Computer Science 13640
  • Išleidimo metai: 09-Dec-2022
  • Leidėjas: Springer International Publishing AG
  • Kalba: eng
  • ISBN-13: 9783031223907

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022.

The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.

Cryptography.- Privacy Preserving Computation in Cloud Using Reusable
Garbled Oblivious RAMs.- Efficient Private Set Intersection Cardinality
Protocol in the Reverse Unbalanced Setting.- Crypto-Steganographic Validity
for Additive Manufacturing (3D Printing) Design Files.- Witness Encryption
from Smooth Projective Hashing System.- Post-Quantum Cryptography.- More
Efficient Adaptively Secure Lattice-based IBE with Equality Test in the
Standard Model.- QUIC Protocol with Post-Quantum Authentication.- Batched
Fully Homomorphic Encryption from TFHE.- Implicit Rejection in
Fujisaki-Okamoto: Framework and a Novel Realization.- Cryptanalysis.- Further
Cryptanalysis of a Type of RSA Variants.- The SAT-Based Automatic Searching
and Experimental Verification for Differential Characteristics with
Application to Midori64.- Efficient Scalar Multiplication on Koblitz Curves
with Pre-computation.- Blockchain.- Efficient ECDSA-based Adaptor Signature
for Batched Atomic Swaps.- Searching for Encrypted Data on Blockchain: An
Efficient, Secure and Fair Realization.- GRUZ : Practical Resource Fair
Exchange without Blockchain.- Daric: A Storage Efficient Payment Channel With
Punishment Mechanism.- A Blockchain-based Mutual Authentication Protocol for
Smart Home.- Email and Web Security.- OblivSend: Secure and Ephemeral File
Sharing Services with Oblivious Expiration Control.- EarlyCrow: Detecting APT
Malware Command and Control Over HTTP(S) Using Contextual
Summaries.- Malware.- ATLAS: A Practical Attack Detection and Live Malware
Analysis System for IoT Threat Intelligence.- Dissecting Applications
Uninstallers & Removers: Are they effective?.- Representing LLVM-IR in a Code
Property Graph.- Why we need a theory of maliciousness: Hardware Performance
Counters in security.- Anatomist: Enhanced Firmware Vulnerability Discovery
Based on Program State Abnormality Determination With Whole-system
Replay.- AI Security.- AspIOC: Aspect-Enhanced Deep Neural Network for
Actionable Indicator of Compromise Recognition.- HeHe: Balancing the Privacy
and Efficiency in Training CNNs over the Semi-honest Cloud.- Deep Learning
Assisted Key Recovery Attack for Round-Reduced Simeck32/64.- CFL: Cluster
Federated Learning in Large-scale Peer-to-Peer Networks.- Bilateral
Privacy-Preserving Task Assignment with Personalized Participant Selection
for Mobile Crowdsensing.- Communication-Efficient and Secure Federated
Learning Based on AdaptiveOne-bit Compressed Sensing.