E-Book, Englisch, Band 15057, 334 Seiten, eBook
Katsikas / Xenakis / Kalloniatis Information and Communications Security
Erscheinungsjahr 2024
ISBN: 978-981-97-8801-9
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark
26th International Conference, ICICS 2024, Mytilene, Greece, August 26–28, 2024, Proceedings, Part II
E-Book, Englisch, Band 15057, 334 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-981-97-8801-9
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
.- Crypto & Applied crypto..- TorHunter: A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic through Unsupervised Pre-training..- Two-round Post-quantum Private Equality Test and OT from RLWE-encryption..- Point Intervention: Improving ACVP Test Vector Generation Through Human Assisted Fuzzing..- FAMC: Fair and Publicly Auditable Multi-Party Computation with Cheater Detection..- Homomorphic encryption.
.- X-Cipher: Achieving Data Resiliency in Homomorphic Ciphertexts.
.- Amortized Functional Bootstrapping for Homomorphic Evaluation of Encrypted Functions.- Tightly Secure Linearly Homomorphic Signature Schemes for Subspace Under DL Assumption in AGM..- Key agreement protocols and digital signature schemes..- CoDPoC IP:A Configurable Data Protection Circuit to Support Multiple Key Agreement Scheme..- Formal analysis of Julia Key Agreement Protocol..- New Construction of Code-Based Signature Schemes..- Identity-Based Signature from Lattices without Trapdoors..- Defences..- The Emperor is Now Clothed: A Secure Web Governance Framework for User Authentication Between Password Managers and Web Apps..- HoneyLLM: A Large Language Model-Powered Medium-interaction Honeypot..- TSR-jack: An In-Browser Crypto-jacking Detection Method Based on Time Series Representation Learning..- Don’t Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational Databases..- FirmPorter: Porting RTOSes at the Binary Level for Firmware Re-hosting.