000 | 05672nam a22006615i 4500 | ||
---|---|---|---|
001 | 978-3-031-22390-7 | ||
003 | DE-He213 | ||
005 | 20240730200619.0 | ||
007 | cr nn 008mamaa | ||
008 | 221130s2022 sz | s |||| 0|eng d | ||
020 |
_a9783031223907 _9978-3-031-22390-7 |
||
024 | 7 |
_a10.1007/978-3-031-22390-7 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aInformation Security _h[electronic resource] : _b25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings / _cedited by Willy Susilo, Xiaofeng Chen, Fuchun Guo, Yudi Zhang, Rolly Intan. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aXXIII, 510 p. 92 illus., 58 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13640 |
|
505 | 0 | _aCryptography -- Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs -- Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting -- Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files -- Witness Encryption from Smooth Projective Hashing System -- Post-Quantum Cryptography -- More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model -- QUIC Protocol with Post-Quantum Authentication -- Batched Fully Homomorphic Encryption from TFHE -- Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization -- Cryptanalysis -- Further Cryptanalysis of a Type of RSA Variants -- The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64 -- Efficient Scalar Multiplication on Koblitz Curves with Pre-computation -- Blockchain -- Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps -- Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization -- GRUZ : Practical Resource Fair Exchange without Blockchain -- Daric: A Storage Efficient Payment Channel With Punishment Mechanism -- A Blockchain-based Mutual Authentication Protocol for Smart Home -- Email and Web Security -- OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control -- EarlyCrow: Detecting APT Malware Command and Control Over HTTP(S) Using Contextual Summaries -- Malware -- ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence -- Dissecting Applications Uninstallers & Removers: Are they effective? -- Representing LLVM-IR in a Code Property Graph -- Why we need a theory of maliciousness: Hardware Performance Counters in security -- Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination With Whole-system Replay -- AI Security -- AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition -- HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud -- Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64 -- CFL: Cluster Federated Learning in Large-scale Peer-to-Peer Networks -- Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing -- Communication-Efficient and Secure Federated Learning Based on Adaptive One-bit Compressed Sensing. | |
520 | _aThis book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022. The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _9164105 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
700 | 1 |
_aSusilo, Willy. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9164106 |
|
700 | 1 |
_aChen, Xiaofeng. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9164107 |
|
700 | 1 |
_aGuo, Fuchun. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9164108 |
|
700 | 1 |
_aZhang, Yudi. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9164109 |
|
700 | 1 |
_aIntan, Rolly. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9164110 |
|
710 | 2 |
_aSpringerLink (Online service) _9164111 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031223891 |
776 | 0 | 8 |
_iPrinted edition: _z9783031223914 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13640 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-22390-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c96142 _d96142 |