000 | 05565nam a22006735i 4500 | ||
---|---|---|---|
001 | 978-981-97-0945-8 | ||
003 | DE-He213 | ||
005 | 20240730171344.0 | ||
007 | cr nn 008mamaa | ||
008 | 240224s2024 si | s |||| 0|eng d | ||
020 |
_a9789819709458 _9978-981-97-0945-8 |
||
024 | 7 |
_a10.1007/978-981-97-0945-8 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aInformation Security and Cryptology _h[electronic resource] : _b19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part II / _cedited by Chunpeng Ge, Moti Yung. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2024. |
|
300 |
_aXVII, 419 p. 114 illus., 90 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14527 |
|
505 | 0 | _aSystem Security: Text Laundering: Mitigating Malicious Features through Knowledge Distillation of Language Foundation Models -- An Android Malware Detection Method Using Better API Contextual Information -- TAElog: A Novel Transformer AutoEncoder-based Log Anomaly Detection Method -- EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch Operation -- Clustered Federated Learning with Inference Hash Codes based Local Sensitive Hashing -- TIA: Token Importance Transferable Attack on Vision Transformers -- Cryptography Engineering: Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber -- V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture -- Cryptanalysis: Improved Integral Cryptanalysis of Block Ciphers BORON and Khudr -- Automatic Search of Linear Structure: Applications to Keccak and Ascon -- Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128 -- Improved Herrmann-May's Attack with Merging Variables and Lower LLL Bound -- Full Round Distinguishing and Key-Recovery Attacks on SAND-2 -- Real-time Symbolic Reasoning Framework for Cryptojacking Detection Based on Netflow-plus Analysis -- Non-malleable Codes from Leakage Resilient Cryptographic Primitives -- Short paper: DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy -- A Practical Multi-Candidate Voting Protocol on Quantum Blockchain Adapted for Various Tally Principles -- Quantum Augmented Lattice Attack on NTRU with Side Information -- Quantum Attacks: A View of Data Complexity on Offline Simon's Algorithm -- FaBFT: Flexible Asynchronous BFT Protocol Using DAG -- Forward Secure Online/offline Key Policy Attribute-based Encryption with Multi-keyword Search -- Differential Privacy Enhanced Dynamic Searchable Symmetric Encryption for Cloud Environments -- Poster: An Efficient Privacy-preserving Scheme for Weak Password Collection in Internet of Things -- TRGE: A Backdoor Detection after Quantizatio -- Improved Homomorphic Evaluation for Hash Function based on TFHE -- Power of Randomness Recovery: Tightly CCA-Secure KEM in the QROM -- Partial Key Exposure Attack on Common Prime RSA -- An Efficient Autonomous Path Proxy Re-Encryption without Pairing for Cloud-assisted mHealth. | |
520 | _aThe two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9-10, 2023. The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: Part I: Signature; blockchain; cryptography primitive; public key cryptography; security and privacy; Part II: System security; cryptography engineering; cryptanalysis; short papers, posters. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aImage processing _xDigital techniques. _94145 |
|
650 | 0 |
_aComputer vision. _998217 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aApplication software. _998218 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Imaging, Vision, Pattern Recognition and Graphics. _931569 |
650 | 2 | 4 |
_aComputer Communication Networks. _998221 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _998224 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aCryptology. _931769 |
700 | 1 |
_aGe, Chunpeng. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _998225 |
|
700 | 1 |
_aYung, Moti. _eeditor. _0(orcid) _10000-0003-0848-0873 _4edt _4http://id.loc.gov/vocabulary/relators/edt _998226 |
|
710 | 2 |
_aSpringerLink (Online service) _998227 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789819709441 |
776 | 0 | 8 |
_iPrinted edition: _z9789819709465 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14527 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-97-0945-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c87541 _d87541 |