Muutke küpsiste eelistusi

E-raamat: Information Security: 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formaat - EPUB+DRM
  • Hind: 86,44 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022.

The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.

Cryptography.- Privacy Preserving Computation in Cloud Using Reusable
Garbled Oblivious RAMs.- Efficient Private Set Intersection Cardinality
Protocol in the Reverse Unbalanced Setting.- Crypto-Steganographic Validity
for Additive Manufacturing (3D Printing) Design Files.- Witness Encryption
from Smooth Projective Hashing System.- Post-Quantum Cryptography.- More
Efficient Adaptively Secure Lattice-based IBE with Equality Test in the
Standard Model.- QUIC Protocol with Post-Quantum Authentication.- Batched
Fully Homomorphic Encryption from TFHE.- Implicit Rejection in
Fujisaki-Okamoto: Framework and a Novel Realization.- Cryptanalysis.- Further
Cryptanalysis of a Type of RSA Variants.- The SAT-Based Automatic Searching
and Experimental Verification for Differential Characteristics with
Application to Midori64.- Efficient Scalar Multiplication on Koblitz Curves
with Pre-computation.- Blockchain.- Efficient ECDSA-based Adaptor Signature
for Batched Atomic Swaps.- Searching for Encrypted Data on Blockchain: An
Efficient, Secure and Fair Realization.- GRUZ : Practical Resource Fair
Exchange without Blockchain.- Daric: A Storage Efficient Payment Channel With
Punishment Mechanism.- A Blockchain-based Mutual Authentication Protocol for
Smart Home.- Email and Web Security.- OblivSend: Secure and Ephemeral File
Sharing Services with Oblivious Expiration Control.- EarlyCrow: Detecting APT
Malware Command and Control Over HTTP(S) Using Contextual
Summaries.- Malware.- ATLAS: A Practical Attack Detection and Live Malware
Analysis System for IoT Threat Intelligence.- Dissecting Applications
Uninstallers & Removers: Are they effective?.- Representing LLVM-IR in a Code
Property Graph.- Why we need a theory of maliciousness: Hardware Performance
Counters in security.- Anatomist: Enhanced Firmware Vulnerability Discovery
Based on Program State Abnormality Determination With Whole-system
Replay.- AI Security.- AspIOC: Aspect-Enhanced Deep Neural Network for
Actionable Indicator of Compromise Recognition.- HeHe: Balancing the Privacy
and Efficiency in Training CNNs over the Semi-honest Cloud.- Deep Learning
Assisted Key Recovery Attack for Round-Reduced Simeck32/64.- CFL: Cluster
Federated Learning in Large-scale Peer-to-Peer Networks.- Bilateral
Privacy-Preserving Task Assignment with Personalized Participant Selection
for Mobile Crowdsensing.- Communication-Efficient and Secure Federated
Learning Based on AdaptiveOne-bit Compressed Sensing.