Information Security Applications (Record no. 87300)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05065nam a22006135i 4500 |
001 - CONTROL NUMBER | |
control field | 978-981-99-8024-6 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730170934.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240110s2024 si | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9789819980246 |
-- | 978-981-99-8024-6 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 005.8 |
245 10 - TITLE STATEMENT | |
Title | Information Security Applications |
Sub Title | 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2024. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XIX, 350 p. 93 illus., 73 illus. in color. |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Cryptography -- A New Higher Order Differential of LCB -- Bloomier filters on 3-hypergraphs -- Principal Component Analysis over the Boolean Circuit within TFHE Scheme -- A security analysis on MQ-Sign -- Network and Application Security -- Research on Security Threats Using VPN in Zero Trust Environments -- A Blockchain-based Mobile Crowdsensing and Its Incentive Mechanism -- A New Frontier in Digital Security: Verification for NFT Image using Deep Learning-based ConvNeXt Model in Quantum Blockchain -- AE-LSTM based anomaly detection system for communication over DNP 3.0 -- Privacy & Management -- Systematic Evaluation of Robustness Against Model Inversion Attacks on Split Learning -- Vulnerability Assessment Framework Based on In-the-Wild Exploitability for Prioritizing Patch Application -- Patchman: Firmware Update Delivery Service Over the Blockchain for IoT Environment -- Security Risk Indicator for OpenSource Software to Measure Software Development Status -- Attacks & Defenses -- Defending AirType against Inference Attacks using 3D In-Air Keyboard Layouts: Design and Evaluation -- Robust Training for Deepfake Detection Models Against Disruption Induced Data Poisoning -- Multi-class Malware Detection via Deep Graph Convolutional Networks using TF-IDF-based Attributed Call Graphs -- OCR meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime -- Enriching Vulnerability Reports Through Automated and Augmented Description Summarization -- Cryptography -- Protecting Kernel Code Integrity with PMP on RISC-V -- Exploiting Memory Page Management in KSM for Remote Memory Deduplication Attack -- Mutation Methods for Structured Input to Enhance Path Coverage of Fuzzers -- Improved Differential-Linear Cryptanalysis of Reduced Rounds of ChaCha -- SP-Fuzz: Fuzzing soft PLC with Semi-automated Harness Synthesis -- Post-Quantum Cryptography & Quantum Cryptanalysis -- Post-Quantum Cryptography & Quantum Cryptanalysis -- PQ-DPoL: An Efficient Post-Quantum Blockchain Consensus Algorithm -- Efficient Implementation of the Classic McEliece on ARMv8 processors -- Evaluating KpqC Algorithm Submissions: A Balanced and Clean Benchmarking Approach. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book constitutes the revised selected papers from the 24th International Conference on Information Security Applications, WISA 2023, held in Jeju Island, South Korea, during August 23-25, 2023. The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Cryptography; network and application security; privacy and management; attacks and defenses; post-quantum cryptography and quantum cryptanalysis. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
General subdivision | Security measures. |
700 1# - AUTHOR 2 | |
Author 2 | Kim, Howon. |
700 1# - AUTHOR 2 | |
Author 2 | Youn, Jonghee. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-981-99-8024-6 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Singapore : |
-- | Springer Nature Singapore : |
-- | Imprint: Springer, |
-- | 2024. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data protection. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer engineering. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks . |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Application software. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer networks |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data and Information Security. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Engineering and Networks. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer and Information Systems Applications. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Mobile and Network Security. |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
-- | 1611-3349 ; |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
No items available.