Information Security: 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings

Willy Susilo,Xiaofeng Chen,Fuchun Guo

ISBN 10: 3031223918 ISBN 13: 9783031223914
Published by Springer 2022-12-01, 2022
New Paperback

From Chiron Media, Wallingford, United Kingdom Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

AbeBooks Seller since August 2, 2010

This specific item is no longer available.

About this Item

Description:

Seller Inventory # 6666-IUK-9783031223914

Report this item

Synopsis:

Cryptography.- Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs.- Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting.- Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files.- Witness Encryption from Smooth Projective Hashing System.- Post-Quantum Cryptography.- More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model.- QUIC Protocol with Post-Quantum Authentication.- Batched Fully Homomorphic Encryption from TFHE.- Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization.- Cryptanalysis.- Further Cryptanalysis of a Type of RSA Variants.- The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64.- Efficient Scalar Multiplication on Koblitz Curves with Pre-computation.- Blockchain.- Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps.- Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization.- GRUZ: Practical Resource Fair Exchange without Blockchain.- Daric: A Storage Efficient Payment Channel With Punishment Mechanism.- A Blockchain-based Mutual Authentication Protocol for Smart Home.- Email and Web Security.- OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control.- EarlyCrow: Detecting APT Malware Command and Control Over HTTP(S) Using Contextual Summaries.- Malware.- ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence.- Dissecting Applications Uninstallers & Removers: Are they effective?.- Representing LLVM-IR in a Code Property Graph.- Why we need a theory of maliciousness: Hardware Performance Counters in security.- Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination With Whole-system Replay.- AI Security.- AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition.- HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud.- Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64.- CFL: Cluster Federated Learning in Large-scale Peer-to-Peer Networks.- Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing.- Communication-Efficient and Secure Federated Learning Based on AdaptiveOne-bit Compressed Sensing.

"About this title" may belong to another edition of this title.

Bibliographic Details

Title: Information Security: 25th International ...
Publisher: Springer 2022-12-01
Publication Date: 2022
Binding: Paperback
Condition: New

Top Search Results from the AbeBooks Marketplace

Stock Image

Published by Springer, 2022
ISBN 10: 3031223918 ISBN 13: 9783031223914
New Softcover

Seller: Ria Christie Collections, Uxbridge, United Kingdom

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: New. In. Seller Inventory # ria9783031223914_new

Contact seller

Buy New

US$ 63.67
US$ 16.33 shipping
Ships from United Kingdom to U.S.A.

Quantity: Over 20 available

Add to basket