000 05065nam a22006135i 4500
001 978-981-99-8024-6
003 DE-He213
005 20240730170934.0
007 cr nn 008mamaa
008 240110s2024 si | s |||| 0|eng d
020 _a9789819980246
_9978-981-99-8024-6
024 7 _a10.1007/978-981-99-8024-6
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aInformation Security Applications
_h[electronic resource] :
_b24th International Conference, WISA 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers /
_cedited by Howon Kim, Jonghee Youn.
250 _a1st ed. 2024.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2024.
300 _aXIX, 350 p. 93 illus., 73 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14402
505 0 _aCryptography -- A New Higher Order Differential of LCB -- Bloomier filters on 3-hypergraphs -- Principal Component Analysis over the Boolean Circuit within TFHE Scheme -- A security analysis on MQ-Sign -- Network and Application Security -- Research on Security Threats Using VPN in Zero Trust Environments -- A Blockchain-based Mobile Crowdsensing and Its Incentive Mechanism -- A New Frontier in Digital Security: Verification for NFT Image using Deep Learning-based ConvNeXt Model in Quantum Blockchain -- AE-LSTM based anomaly detection system for communication over DNP 3.0 -- Privacy & Management -- Systematic Evaluation of Robustness Against Model Inversion Attacks on Split Learning -- Vulnerability Assessment Framework Based on In-the-Wild Exploitability for Prioritizing Patch Application -- Patchman: Firmware Update Delivery Service Over the Blockchain for IoT Environment -- Security Risk Indicator for OpenSource Software to Measure Software Development Status -- Attacks & Defenses -- Defending AirType against Inference Attacks using 3D In-Air Keyboard Layouts: Design and Evaluation -- Robust Training for Deepfake Detection Models Against Disruption Induced Data Poisoning -- Multi-class Malware Detection via Deep Graph Convolutional Networks using TF-IDF-based Attributed Call Graphs -- OCR meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime -- Enriching Vulnerability Reports Through Automated and Augmented Description Summarization -- Cryptography -- Protecting Kernel Code Integrity with PMP on RISC-V -- Exploiting Memory Page Management in KSM for Remote Memory Deduplication Attack -- Mutation Methods for Structured Input to Enhance Path Coverage of Fuzzers -- Improved Differential-Linear Cryptanalysis of Reduced Rounds of ChaCha -- SP-Fuzz: Fuzzing soft PLC with Semi-automated Harness Synthesis -- Post-Quantum Cryptography & Quantum Cryptanalysis -- Post-Quantum Cryptography & Quantum Cryptanalysis -- PQ-DPoL: An Efficient Post-Quantum Blockchain Consensus Algorithm -- Efficient Implementation of the Classic McEliece on ARMv8 processors -- Evaluating KpqC Algorithm Submissions: A Balanced and Clean Benchmarking Approach.
520 _aThis book constitutes the revised selected papers from the 24th International Conference on Information Security Applications, WISA 2023, held in Jeju Island, South Korea, during August 23-25, 2023. The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Cryptography; network and application security; privacy and management; attacks and defenses; post-quantum cryptography and quantum cryptanalysis.
650 0 _aData protection.
_97245
650 0 _aComputer engineering.
_910164
650 0 _aComputer networks .
_931572
650 0 _aApplication software.
_996375
650 0 _aComputer networks
_xSecurity measures.
_93969
650 1 4 _aData and Information Security.
_931990
650 2 4 _aComputer Engineering and Networks.
_996376
650 2 4 _aComputer and Information Systems Applications.
_996378
650 2 4 _aMobile and Network Security.
_933624
700 1 _aKim, Howon.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_996379
700 1 _aYoun, Jonghee.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_996380
710 2 _aSpringerLink (Online service)
_996381
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789819980239
776 0 8 _iPrinted edition:
_z9789819980253
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14402
_923263
856 4 0 _uhttps://doi.org/10.1007/978-981-99-8024-6
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cEBK
999 _c87300
_d87300