Skip to:Content
|
Bottom
Cover image for Information Security 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings
Title:
Information Security 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings
Author:
Athanasopoulos, Elias. editor.
ISBN:
9783031491870
Edition:
1st ed. 2023.
Physical Description:
XIV, 598 p. 130 illus., 79 illus. in color. online resource.
Series:
Lecture Notes in Computer Science, 14411
Contents:
Privacy: Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense against Model Inversion Attacks -- Privacy-preserving Medical Data Generation using Adversarial Learning -- Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning -- Intrusion Detection and Systems: SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection -- VNGuard: Intrusion Detection System for In-Vehicle Networks -- RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing -- Machine Learning: Loss and Likelihood Based Membership Inference of Diffusion Models -- Symmetry Defense Against CNN Adversarial Perturbation Attacks -- Web Security: Load-and-Act: Increasing Page Coverage of Web Applications -- From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions -- Mobile Security and Trusted Execution: Libra : Library Identification in Obfuscated Android Apps -- Certificate reuse in Android applications -- TC4SE: A High-performance Trusted Channel Mechanism for Secure Enclave-based Trusted Execution Environments -- Post-Quantum Cryptography: Performance Impact of PQC KEMs on TLS 1.3 under Varying Network Characteristics -- Protecting Private Keys of Dilithium using Hardware Transactional Memory -- Multiparty Computation: Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals -- Evolving Conditional Disclosure of Secrets -- Symmetric Cryptography: Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size -- Impossible Differential Cryptanalysis of the FBC Block Cipher -- Fregata: Faster Homomorphic Evaluation of AES via TFHE -- Key Management: Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography -- On the Privacy-preserving Infrastructure for Authenticated Key Exchange -- Hybrid Group Key Exchange with Application to Constrained Networks -- Functional and Updatable Encryption -- Dynamic Multi-Server Updatable Encryption -- Trace-and-Revoke Quadratic Functional Encryption -- Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings -- Signatures, Hashes, and Cryptanalysis: Robust Property-Preserving Hash Meets Homomorphism -- Withdrawable Signature: How to Call off a Signature -- An Improved BKW Algorithm for Solving LWE with Small Secrets.
Added Corporate Author:
Holds:
Copies:

Available:*

Library
Material Type
Item Barcode
Shelf Number
Status
Item Holds
Searching...
E-Book 521356-1001 XX(521356.1)
Searching...

On Order

Go to:Top of Page