E-Book, Englisch, Band 15257, 336 Seiten, eBook
Mouha / Nikiforakis Information Security
Erscheinungsjahr 2024
ISBN: 978-3-031-75757-0
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
27th International Conference, ISC 2024, Arlington, VA, USA, October 23–25, 2024, Proceedings, Part I
E-Book, Englisch, Band 15257, 336 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-031-75757-0
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
.- Blockchain..- The Formal Verification of Aptos Coin..- Anonymous, Timed and Revocable Proxy Signatures..- Symmetric-Key Cryptography..- MILP/MIQCP-Based Differential-Linear Cryptanalysis on CHAM-64/128..- Security Analysis of CMAC in the Multi-User Model..- Quantum Key Recovery Attacks on 4-round Iterated Even-Mansour with Two Keys..- Machine Learning..- Optimizing label-only membership inference attacks by global relative decision boundary distances..- Risk of Text Backdoor Attacks under Dataset Distillation..- Mobile Security and Trusted Execution..- Emulating Android Device Drivers via Borrowed Execution Context..- Software Security..- SyzLego: Enhancing Kernel Directed Greybox Fuzzing via Dependency Inference and Scheduling..- A Lightweight Defense Scheme against Usermode Helper Privilege Escalation Using Linux Capability..- Multi-Party Computation..- Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles..- ChronoCloak: An integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination..- Large-Plaintext Functional Bootstrapping with Small Parameters for BGV Encoding..- Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations..- Robust Multiparty Computation from Threshold Encryption Based on RLWE..- Efficient Blind Rotation in FHEW using Refined Decomposition and NTT..- Post-Quantum Cryptography..- Solving McEliece-1409 in One Day — Cryptanalysis with the Improved BJMM Algorithm..- Deep LLL on Module lattices..- Multi-way High-throughput Implementation of Kyber..- The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys..- A faster variant of CGL hash function via efficient backtracking checks..- Streamlining CSIDH: Cost-Effective Strategies for Group Actions Evaluation..- System Security..- Channel Robust Strategies with Data Augmentation for Audio Anti-Spoofing..- Property Guided Secure Configuration Space Search..- Adversarial analysis of software composition analysis tools..- News Reader: A News Interest Identification Attack using Single-Electrode Brainwave Signals.