Muutke küpsiste eelistusi

E-raamat: Security, Privacy, and Applied Cryptography Engineering: 15th International Conference, SPACE 2025, Guwahati, India, December 16-19, 2025, Proceedings

Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 74,09 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the proceedings of the 15th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2025, held in Guwahati, India, during December 1619, 2025.



The 22 full papers included in this book were carefully reviewed and selected from 103 submissions.They focus on various aspects of security, privacy, applied cryptography, and cryptographic engineering offering valuable insights and innovative solutions toward a better, more secure digital world.
.- A Custom Entropy Harvester for Consistent Entropy Supply to the
/dev/random.
.- Efficient Time Share Masking of AES.
.- Investigation on the Impact of Practical Fault Model for Commercial Edge
Machine Learning Devices.
.- A new perspective on the decomposition in the Jacobian of small
genus hyperelliptic curve.
.- A Multi-View Contrastive Graph Neural Network Framework for Malware
Detection in IoMT environments.
.-  PAC-Guided Design Strategies for Resilient Priority Arbiter PUFs.
.-  Toward Crypto Agility: Automated Analysis of Quantum-Vulnerable TLS via
Packet Inspection.
.- GhostWriter: Exploiting GPU-Cache Contention to Steal and
Steer Multi-Tenant Large-Language-Model Inference.
.-  Breaking PCB-Chain: A Side Channel Assisted Attack on IoT-Friendly
Blockchain Mining.
.- Analyzing Non-linear Shift Register Transformations in the Design
and Cryptanalysis of Espresso.
.-  Sample Similarity based Incremental Clustering: An Effective Methodology
for Anomaly Detection in Networks .
.- Addressing Cache Side-Channel Attacks using Taint-guidedFine-grained
Computation Offloading in Near-Memory Processing.
.-  Gradient-Guided Adversarial Patch Attack for Deep Neural Networks.
.-  High throughput 64-bit implementation of SNOW-V stream cipher.
.- A Security Analysis of CNN Partitioning Strategies for
Distributed Inference at the Edge.
.-  MLP is better than ResNet on ANSSIs Protected AES Implementation on
ARM.
.- VulScan-LT: A Lightweight Transformer-based Software VulnerabilityScanning
Tool for Resource-Constrained Edge Devices.
.- Enhanced Hardware Trojan Detection with XGBoost Graph Learning:A Glass Box
Approach.
.- Hard-to-Find Bugs in Public-Key Cryptographic Software:Classification and
Test Methodologies.
.- Secure Secret Sharing Protocol Against Network Data Remanence Side Channel
Attacks.
.-  Quantum Synthesis of Large S-Boxes: Heuristic and MILP-Based
Transpiled-Depth Optimization.
.-  A keystream generator inspired by the experiment of drawing balls with
replacement.