000 05887nam a22006255i 4500
001 978-981-99-7032-2
003 DE-He213
005 20240730201714.0
007 cr nn 008mamaa
008 231107s2023 si | s |||| 0|eng d
020 _a9789819970322
_9978-981-99-7032-2
024 7 _a10.1007/978-981-99-7032-2
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
082 0 4 _a005.8
_223
245 1 0 _aInformation Security Practice and Experience
_h[electronic resource] :
_b18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings /
_cedited by Weizhi Meng, Zheng Yan, Vincenzo Piuri.
250 _a1st ed. 2023.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2023.
300 _aXIV, 616 p. 157 illus., 114 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14341
505 0 _aSecure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion Recognition -- FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems using Autoencoder-based Latent Space Representations -- Mitigating Sybil Attacks in Federated Learning -- Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics -- Obfuscation padding schemes that minimize Renyi min-entropy for Privacy -- Cross-border Data Security from the Perspective of Risk Assessment -- IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures -- CVAR-FL IoV Intrusion Detection Framework -- Transparent Security Method for Automating IoT Security Assessments -- DIDO: Data Provenance from Restricted TLS 1.3 Websites -- QR-SACP: Quantitative Risk-based Situational Awareness Calculation and Projection through Threat Information Sharing -- Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G -- RTR-Shield: Early Detection of Ransomware using Registry and Trap Files -- MalXCap: A Method for Malware Capability Extraction -- Multimodal Software bug Severity Prediction Based on Sentiment Probability -- Recovering Multi-Prime RSA Keys with Erasures and Errors -- Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example -- Chosen Ciphertext Security for Blind Identity-based Encryption with Certified Identities -- A New Gadget Decomposition Algorithm with Less Noise Growth in HE schemes -- Malicious Player Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations -- Cryptanalysis of Human Identification Protocol with Human-Computable Passwords -- A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS) -- A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability -- LocKey: Location-based Key Extraction from the WiFi Environment in the User's Vicinity -- BAHS: a Blockchain-Aided Hash-based Signature Scheme -- Lever: Making Intensive Validation Practical on Blockchain -- Tikuna: An Ethereum Blockchain Network Security Monitoring System -- Isogeny-based Multi-Signature Scheme -- Security Analysis of WAGE against Division Property based Cube Attack -- When MPC in the Head meets VC -- Quantum Key Distribution as a Service and Its Injection into TLS -- XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph -- XSS attack detection by attention mechanism based on script tags in URLs -- Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning -- SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain.
520 _aThis book constitutes the refereed proceedings of the 18th International Conference on Information Security Practice and Experience, ISPEC 2023, held in Copenhagen, Denmark, in August 2023. The 27 full papers and 8 short papers included in this volume were carefully reviewed and selected from 80 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
650 0 _aData protection.
_97245
650 0 _aComputer networks .
_931572
650 0 _aComputer systems.
_9168385
650 0 _aApplication software.
_9168386
650 0 _aComputers.
_98172
650 1 4 _aSecurity Services.
_978910
650 2 4 _aComputer Communication Networks.
_9168387
650 2 4 _aComputer System Implementation.
_938514
650 2 4 _aComputer and Information Systems Applications.
_9168388
650 2 4 _aComputing Milieux.
_955441
650 2 4 _aData and Information Security.
_931990
700 1 _aMeng, Weizhi.
_eeditor.
_0(orcid)
_10000-0003-4384-5786
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9168389
700 1 _aYan, Zheng.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9168390
700 1 _aPiuri, Vincenzo.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9168391
710 2 _aSpringerLink (Online service)
_9168392
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789819970315
776 0 8 _iPrinted edition:
_z9789819970339
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14341
_923263
856 4 0 _uhttps://doi.org/10.1007/978-981-99-7032-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c96669
_d96669