Information and Communications Security (Record no. 185736)

MARC details
000 -LEADER
fixed length control field 06862nam a22007335i 4500
001 - CONTROL NUMBER
control field 978-981-99-7356-9
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423130148.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 231019s2023 si | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789819973569
-- 978-981-99-7356-9
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-981-99-7356-9
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.D35
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number Q350-390
072 #7 - SUBJECT CATEGORY CODE
Subject category code UMB
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code GPF
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM021000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UMB
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code GPF
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.73
Edition number 23
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 003.54
Edition number 23
245 10 - TITLE STATEMENT
Title Information and Communications Security
Medium [electronic resource] :
Remainder of title 25th International Conference, ICICS 2023, Tianjin, China, November 18–20, 2023, Proceedings /
Statement of responsibility, etc edited by Ding Wang, Moti Yung, Zheli Liu, Xiaofeng Chen.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2023.
264 #1 -
-- Singapore :
-- Springer Nature Singapore :
-- Imprint: Springer,
-- 2023.
300 ## - PHYSICAL DESCRIPTION
Extent XXV, 763 p. 209 illus., 169 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
International Standard Serial Number 1611-3349 ;
Volume number/sequential designation 14252
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Symmetric-Key Cryptography -- SAT-aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA -- Improved Related-Key Rectangle Attack against the Full AES-192 -- Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM -- Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher -- PAE: Towards More Efficient and BBB-secure AE From a Single Public Permutation -- Public-Key Cryptography -- A Polynomial-time Attack on G2SIDH -- Improvements of Homomorphic Secure Evaluation of Inverse Square Root -- Oblivious Transfer from Rerandomizable PKE -- Forward Secure Lattice-based Ring Signature Scheme in the Standard Model -- Applied Cryptography -- Secure Multi-Party Computation with Legally-Enforceable Fairness -- On-demand Allocation of Cryptographic Computing Resource with Load Prediction -- Private Message Franking with After Opening Privacy -- Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction -- Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography -- Authentication and Authorization -- PiXi: Password Inspiration by Exploring Information -- Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris Verification -- A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things -- BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks -- Privacy and Anonymity -- Link Prediction-Based Multi-Identity Recognition of Darknet Vendors -- CryptoMask: Privacy-preserving Face Recognition -- Efficient Private Multiset ID Protocols -- Zoomer: A Website Fingerprinting Attack against Tor Hidden Services -- An Enhanced Privacy-preserving Hierarchical Federated Learning Framework for IoV -- Security and Privacy of AI -- Revisiting the Deep Learning-based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors -- Multi-scale Features Destructive Universal Adversarial Perturbations -- Pixel-Wise Reconstruction of Private Data in Split Federated Learning -- Neural Network Backdoor Attacks Fully Controlled by Composite Natural Utterance Fragments -- Black-Box Fairness Testing with Shadow Models -- Graph Unlearning using Knowledge Distillation -- AFLOW: Developing Adversarial Examples under Extremely Noise-limited Settings -- Learning to Detect Deepfakes via Adaptive Attention and Constrained Difference -- A Novel Deep Ensemble Framework for Online Signature Verification Using Temporal and Spatial Representation -- Blockchain and Cryptocurrencies -- SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains -- Subsidy Bridge: Rewarding Cross-blockchain Relayers with Subsidy -- Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-based Cryptocurrency Transactions -- Blockchain based Publicly Auditable Multi-Party Computation with Cheater Detection -- BDTS: Blockchain-based Data Trading System -- Illegal Accounts Detection on Ethereum using Heterogeneous Graph Transformer Networks -- System and Network security -- DRoT: A Decentralised Root of Trust for Trusted Networks -- Finding Missing Security Operation Bugs via Program Slicing and Differential Check -- TimeClave: Oblivious In-enclave Time series Processing System -- Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios -- A Fake News Detection Method Based on A Multimodal Cooperative Attention Network.
520 ## - SUMMARY, ETC.
Summary, etc This volume LNCS 14252 constitutes the refereed proceedings of 25th International Conference on Information and Communications Security, ICICS 2023, held in Tianjin, China, during November 18–20, 2023. The 38 full papers presented together with 6 short papers were carefully reviewed and selected from 181 submissions. The conference focuses on: Symmetric-Key Cryptography; Public-Key Cryptography; Applied Cryptography; Authentication and Authorization; Privacy and Anonymity; Security and Privacy of AI; Blockchain and Cryptocurrencies; and System and Network Security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data structures (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Information theory.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Database management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data mining.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Application software.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Image processing
General subdivision Digital techniques.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer vision.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science).
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Structures and Information Theory.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Database Management.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data Mining and Knowledge Discovery.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer and Information Systems Applications.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Imaging, Vision, Pattern Recognition and Graphics.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptology.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Wang, Ding.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Yung, Moti.
Relator term editor.
-- (orcid)
-- 0000-0003-0848-0873
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Liu, Zheli.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Chen, Xiaofeng.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9789819973552
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9789819973576
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture Notes in Computer Science,
-- 1611-3349 ;
Volume number/sequential designation 14252
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-981-99-7356-9">https://doi.org/10.1007/978-981-99-7356-9</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in