Information Security and Cryptology (Record no. 87541)

000 -LEADER
fixed length control field 05565nam a22006735i 4500
001 - CONTROL NUMBER
control field 978-981-97-0945-8
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730171344.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240224s2024 si | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9789819709458
-- 978-981-97-0945-8
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
245 10 - TITLE STATEMENT
Title Information Security and Cryptology
Sub Title 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part II /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2024.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XVII, 419 p. 114 illus., 90 illus. in color.
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Remark 2 System Security: Text Laundering: Mitigating Malicious Features through Knowledge Distillation of Language Foundation Models -- An Android Malware Detection Method Using Better API Contextual Information -- TAElog: A Novel Transformer AutoEncoder-based Log Anomaly Detection Method -- EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch Operation -- Clustered Federated Learning with Inference Hash Codes based Local Sensitive Hashing -- TIA: Token Importance Transferable Attack on Vision Transformers -- Cryptography Engineering: Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber -- V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture -- Cryptanalysis: Improved Integral Cryptanalysis of Block Ciphers BORON and Khudr -- Automatic Search of Linear Structure: Applications to Keccak and Ascon -- Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128 -- Improved Herrmann-May's Attack with Merging Variables and Lower LLL Bound -- Full Round Distinguishing and Key-Recovery Attacks on SAND-2 -- Real-time Symbolic Reasoning Framework for Cryptojacking Detection Based on Netflow-plus Analysis -- Non-malleable Codes from Leakage Resilient Cryptographic Primitives -- Short paper: DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy -- A Practical Multi-Candidate Voting Protocol on Quantum Blockchain Adapted for Various Tally Principles -- Quantum Augmented Lattice Attack on NTRU with Side Information -- Quantum Attacks: A View of Data Complexity on Offline Simon's Algorithm -- FaBFT: Flexible Asynchronous BFT Protocol Using DAG -- Forward Secure Online/offline Key Policy Attribute-based Encryption with Multi-keyword Search -- Differential Privacy Enhanced Dynamic Searchable Symmetric Encryption for Cloud Environments -- Poster: An Efficient Privacy-preserving Scheme for Weak Password Collection in Internet of Things -- TRGE: A Backdoor Detection after Quantizatio -- Improved Homomorphic Evaluation for Hash Function based on TFHE -- Power of Randomness Recovery: Tightly CCA-Secure KEM in the QROM -- Partial Key Exposure Attack on Common Prime RSA -- An Efficient Autonomous Path Proxy Re-Encryption without Pairing for Cloud-assisted mHealth.
520 ## - SUMMARY, ETC.
Summary, etc The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9-10, 2023. The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: Part I: Signature; blockchain; cryptography primitive; public key cryptography; security and privacy; Part II: System security; cryptography engineering; cryptanalysis; short papers, posters.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Digital techniques.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Security measures.
700 1# - AUTHOR 2
Author 2 Ge, Chunpeng.
700 1# - AUTHOR 2
Author 2 Yung, Moti.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-981-97-0945-8
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Singapore :
-- Springer Nature Singapore :
-- Imprint: Springer,
-- 2024.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data protection.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Image processing
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer vision.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks .
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Application software.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer networks
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cryptography.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data encryption (Computer science).
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Imaging, Vision, Pattern Recognition and Graphics.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer and Information Systems Applications.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Mobile and Network Security.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cryptology.
700 1# - AUTHOR 2
-- (orcid)
-- 0000-0003-0848-0873
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 1611-3349 ;
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC

No items available.