Security, Privacy, and Applied Cryptography Engineering (Record no. 88317)

000 -LEADER
fixed length control field 04781nam a22006255i 4500
001 - CONTROL NUMBER
control field 978-3-031-22829-2
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240730172447.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 221206s2022 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031228292
-- 978-3-031-22829-2
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-031-22829-2
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
245 10 - TITLE STATEMENT
Title Security, Privacy, and Applied Cryptography Engineering
Medium [electronic resource] :
Remainder of title 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings /
Statement of responsibility, etc. edited by Lejla Batina, Stjepan Picek, Mainack Mondal.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2022.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Cham :
Name of producer, publisher, distributor, manufacturer Springer Nature Switzerland :
-- Imprint: Springer,
Date of production, publication, distribution, manufacture, or copyright notice 2022.
300 ## - PHYSICAL DESCRIPTION
Extent X, 343 p. 104 illus., 75 illus. in color.
Other physical details online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
International Standard Serial Number 1611-3349 ;
Volume/sequential designation 13783
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Symmetric Cryptography -- Modeling Large S-box in MILP and a (Related-key) Differential Attack on Full Round PIPO-64/128 -- Light but Tight: Lightweight Composition of Serialized S-Boxes with Diffusion Layers for Strong Ciphers -- Hardware Implementation of Masked SKINNY SBox with Application to AEAD -- Bias Cancellation of MixColumns -- Big Brother Is Watching You: A Closer Look At Backdoor Construction -- Public-key Cryptography, Post-quantum Cryptography, Zero Knowledge Proofs -- KEMTLS vs. Post-Quantum TLS: Performance on Embedded Systems -- Protecting the most significant bits in scalar multiplication algorithms -- Combining Montgomery Multiplication with Tag Tracing for the Pollard ' s Rho Algorithm in Prime Order Fields -- Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABC end view -- Hardware Security and AI -- What Do You See? Transforming Fault Injection Target Characterizations -- Dual-Tone Multi-Frequency Assisted Acoustic Side Channel Attack to Retrieve Dialled Call Log -- Machine Learning Attacks on Low-Cost Reconfigurable XRRO and XRBR PUF Designs -- HWGN2: Side-channel Protected NNs through Secure and Private Function Evaluation -- How Many Cameras Do You Need? Adversarial Attacks and Countermeasures for Robust Perception in Autonomous Vehicles -- Network security, Authentication, and Privacy -- SMarT: A SMT based Privacy Preserving Smart Meter Streaming Methodology -- An analysis of the hardware-friendliness of AMQ data structures for network security -- RemOD: Operational Drift-adaptive Intrusion Detection -- A short note on a paper titled A Delaunay Quadrangle-Based Fingerprint Authentication System with Template Protection using Topology Code for local registration and security enhancement.
520 ## - SUMMARY, ETC.
Summary, etc. This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9-12, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection.
9 (RLIN) 7245
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer engineering.
9 (RLIN) 10164
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks .
9 (RLIN) 31572
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
9 (RLIN) 1973
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data encryption (Computer science).
9 (RLIN) 9168
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data and Information Security.
9 (RLIN) 31990
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Engineering and Networks.
9 (RLIN) 103833
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptology.
9 (RLIN) 31769
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Engineering and Networks.
9 (RLIN) 103833
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Batina, Lejla.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 103835
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Picek, Stjepan.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 103836
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Mondal, Mainack.
Relator term editor.
Relationship edt
-- http://id.loc.gov/vocabulary/relators/edt
9 (RLIN) 103838
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
9 (RLIN) 103839
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031228285
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783031228308
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture Notes in Computer Science,
International Standard Serial Number 1611-3349 ;
Volume/sequential designation 13783
9 (RLIN) 23263
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-031-22829-2">https://doi.org/10.1007/978-3-031-22829-2</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-Lecture Notes in CS

No items available.