Atnaujinkite slapukų nuostatas

El. knyga: Security and Privacy in Communication Networks: 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China.





The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows:  





Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security.





Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security.
AI for Security.- Classify Me Correctly if You Can Evaluating
Adversarial Machine Learning Threats in NIDS.- CUFT Cuflow based Approach
with Multi headed Attention Mechanism for Encrypted Traffic Classification.-
CyberEA An Efficient Entity Alignment Framework for Cybersecurity Knowledge
Graph.- DNN Architecture Attacks via Network and Power Side Channels.-
Invisibility Spell Adversarial Patch Attack Against Object Detectors.- Meta
Perturbation Generation Network for Text based CAPTCHA.- Model Inversion
Attacks on Homogeneous and Heterogeneous Graph Neural Networks.- Unsupervised
Multi Criteria Adversarial Detection in Deep Image Retrieval.- VRC GraphNet A
Graph Neural Network based Reasoning Framework for Attacking Visual Reasoning
Captchas.- Authentication.- An Adaptive Authentication Protocol for Internet
of Vehicles Based on Vehicle Density.- Discovering and Understanding the
Security Flaws of Authentication and Authorization in IoT Cloud APIs for
Smart Home.- Optimizing Lightweight Intermittent Message Authentication for
Programmable Logic Controller.- Blockchain and Distributed System
Security.- Byzantine Protocols with Asymptotically Optimal Communication
Complexity.- Demystifying Blockchain Scalability Sibling Chains with Minimal
Interleaving.- VDABSys A novel security testing framework for blockchain
systems based on vulnerability detection. Cryptography.- Anonymous Key
Issuing Protocol with Certified Identities in Identity based Encryption.-
Batch Lattice Based Designated Verifier ZK SNARKs for R1CS.- Certificateless
Aggregate Signature Without Trapdoor for Cloud Storage.- Efficient Zero
Knowledge for Regular Language.- Enabling Fast Settlement in Atomic
Cross-Chain Swaps.- HeSUN Homomorphic Encryption for Secure Unbounded Neural
Network Inference.- Optimization of Functional Bootstraps with Large LUT and
Packing Key Switching.- Data Security.- An Authentication Algorithm for Sets
of Spatial Data Objects.- An Efficient Private Information Retrieval Protocol
Based on TFHE.- mShield Protect In-process Sensitive Data Against Vulnerable
Third Party Libraries.- Password Cracking by Exploiting User Group
Information.