Atnaujinkite slapukų nuostatas

Security and Privacy: 3rd International Conference, ICSP 2024, Jamshedpur, India, November 2021, 2024, Proceedings [Minkštas viršelis]

Edited by , Edited by , Edited by
  • Formatas: Paperback / softback, 195 pages, aukštis x plotis: 235x155 mm, 25 Illustrations, color; 14 Illustrations, black and white; XII, 195 p. 39 illus., 25 illus. in color., 1 Paperback / softback
  • Serija: Communications in Computer and Information Science 2489
  • Išleidimo metai: 23-May-2025
  • Leidėjas: Springer International Publishing AG
  • ISBN-10: 3031905865
  • ISBN-13: 9783031905865
Kitos knygos pagal šią temą:
  • Formatas: Paperback / softback, 195 pages, aukštis x plotis: 235x155 mm, 25 Illustrations, color; 14 Illustrations, black and white; XII, 195 p. 39 illus., 25 illus. in color., 1 Paperback / softback
  • Serija: Communications in Computer and Information Science 2489
  • Išleidimo metai: 23-May-2025
  • Leidėjas: Springer International Publishing AG
  • ISBN-10: 3031905865
  • ISBN-13: 9783031905865
Kitos knygos pagal šią temą:

This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy, ICSP 2024, held in Jamshedpur, India, during November 20–21, 2024. 

The 12 full papers and 1 short paper included in this book were carefully reviewed and selected from 39 submissions. They were organized in topical sections as follows: Cryptanalysis and Other Attacks; Boolean Functions; Authentication and authorization, Cyber-physical systems security, Privacy-preserving technologies; Blockchain and Cryptocurrency, IoT security and privacy, Database security; Quantum Cryptography.

.- Cryptanalysis and Other Attacks.
.- SIS-Based Signature Schemes and Their Countermeasures: From Vulnerability
to Vigilance.
.- On the Security of AMRIBE, Anonymous Multi-receiver Identity-based
Encryption.
.- Algebraic Cryptanalysis and countermeasures of Lightweight Signature
Scheme based on Multivariate Quadratic Polynomials.
.- Boolean Functions.
.- Construction of Boolean functions with 2k-valued Walsh Spectrum and High
Nonlinearity.
.- On (Noisy) Simon's (Quantum) Algorithm for multi-shift Boolean Functions.
.- Authentication and authorization, Cyber-physical systems security,
Privacy-preserving technologies.
.- Generation of Believable Fake Integral Equations for Cyber Deception.
.- A Security and Privacy Model For Automotive.
.- MAP-ECC: Mutual Authentication Protocol for e-Agriculture using ECC.
.- Blockchain and Cryptocurrency, IoT security and privacy, Database
security.
.- Advanced Image Steganography: Leveraging SLIC and QWT for Robust Data
Hiding.
.- A Secure and Decentralized EHR System Using Blockchain and IPFS.
.- SQL Injection Detection.
.- Quantum Cryptography.
.- A Quantum Public Key Cryptographic Scheme using Entangled States and
Grover Operator.
.- An Efficient and Secure Quantum Group Signature with Applications to
Vehicular Ad Hoc Networks.