000 05253nam a22005655i 4500
001 978-3-031-30122-3
003 DE-He213
005 20240730175309.0
007 cr nn 008mamaa
008 230331s2023 sz | s |||| 0|eng d
020 _a9783031301223
_9978-3-031-30122-3
024 7 _a10.1007/978-3-031-30122-3
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aFoundations and Practice of Security
_h[electronic resource] :
_b15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers /
_cedited by Guy-Vincent Jourdan, Laurent Mounier, Carlisle Adams, Florence Sèdes, Joaquin Garcia-Alfaro.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2023.
300 _aXIII, 474 p. 133 illus., 98 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v13877
505 0 _aCryptography -- Security Analysis of Improved EDHOC Protocol -- A Survey on Identity-based Blind Signature -- Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES -- Post-Quantum and UC-secure Oblivious Transfer from SPHF with Grey Zone -- A New Class of Trapdoor Verifiable Delay Functions -- Practical homomorphic evaluation of block-cipher-based hash functions with applications -- Towards a maturity model for crypto-agility assessment -- Machine Learning -- Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher -- Data-driven Evaluation of Intrusion Detectors : a Methodological Framework -- CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter -- Cybercrime and Privacy -- Where is The Python Interpreter? -- Automating Device Fingerprinting Attacks in 4G and5G NSA Mobile Networks -- Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms -- A Taxonomy and Gap-analysis in Digital Privacy Education -- Differentially Private Friends Recommendation -- Physical-layer Security -- Underwater Confidential Communications in JANUS -- Defense Models for Data Recovery in Industrial Control Systems -- SCADA Radio Blackbox Reverse Engineering -- Blockchain -- Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts -- Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts -- Money Transfer on Transaction Signature-based Ledger -- A Decentralized Mnemonic Backup System for Non-Custodial Cryptocurrency Wallets -- IoT and Security Protocols -- If-This-Then-Allow-That (to Phone Home): A Trigger-Based NetworkPolicy Enforcement Framework for Smart Homes -- Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords -- Towards Characterizing IoT Software Update Practices -- Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic -- Short Papers -- A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection -- Deep-Learning-Based Vulnerability Detection in Binary Executables -- Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis.
520 _aThis book constitutes the refereed proceedings of the 15th International Symposium on Foundations and Practice of Security, FPS 2022, held in Ottawa, ON, Canada, during December 12-14, 2022. The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers.
650 0 _aData protection.
_97245
650 1 4 _aData and Information Security.
_931990
700 1 _aJourdan, Guy-Vincent.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9116193
700 1 _aMounier, Laurent.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9116194
700 1 _aAdams, Carlisle.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9116195
700 1 _aSèdes, Florence.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9116196
700 1 _aGarcia-Alfaro, Joaquin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9116197
710 2 _aSpringerLink (Online service)
_9116198
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031301216
776 0 8 _iPrinted edition:
_z9783031301230
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v13877
_923263
856 4 0 _uhttps://doi.org/10.1007/978-3-031-30122-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c89867
_d89867