Information Security
Springer International Publishing (Verlag)
978-3-031-22389-1 (ISBN)
The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.
Cryptography.- Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs.- Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting.- Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files.- Witness Encryption from Smooth Projective Hashing System.- Post-Quantum Cryptography.- More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model.- QUIC Protocol with Post-Quantum Authentication.- Batched Fully Homomorphic Encryption from TFHE.- Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization.- Cryptanalysis.- Further Cryptanalysis of a Type of RSA Variants.- The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64.- Efficient Scalar Multiplication on Koblitz Curves with Pre-computation.- Blockchain.- Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps.- Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization.- GRUZ : Practical Resource Fair Exchange without Blockchain.- Daric: A Storage Efficient Payment Channel With Punishment Mechanism.- A Blockchain-based Mutual Authentication Protocol for Smart Home.- Email and Web Security.- OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control.- EarlyCrow: Detecting APT Malware Command and Control Over HTTP(S) Using Contextual Summaries.- Malware.- ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence.- Dissecting Applications Uninstallers & Removers: Are they effective?.- Representing LLVM-IR in a Code Property Graph.- Why we need a theory of maliciousness: Hardware Performance Counters in security.- Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination With Whole-system Replay.- AI Security.- AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition.- HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud.- Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64.- CFL: Cluster Federated Learning in Large-scale Peer-to-Peer Networks.- Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing.- Communication-Efficient and Secure Federated Learning Based on AdaptiveOne-bit Compressed Sensing.
Erscheinungsdatum | 02.12.2022 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XXIII, 510 p. 92 illus., 58 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 813 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Artificial Intelligence • authentication • Communication Systems • Computer Networks • Computer systems • cryptography • Databases • Data communication systems • Data Mining • Data Security • distributed computer systems • Distributed Systems • Encryption • Engineering • Network Protocols • Network Security • parallel processing systems • Public Key Cryptography • Signal Processing • Software Design • Software engineering |
ISBN-10 | 3-031-22389-6 / 3031223896 |
ISBN-13 | 978-3-031-22389-1 / 9783031223891 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich