Security and Privacy in Communication Networks (Record no. 186327)

MARC details
000 -LEADER
fixed length control field 06973nam a22006135i 4500
001 - CONTROL NUMBER
control field 978-3-031-25538-0
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423130223.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230203s2023 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031255380
-- 978-3-031-25538-0
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-031-25538-0
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
245 10 - TITLE STATEMENT
Title Security and Privacy in Communication Networks
Medium [electronic resource] :
Remainder of title 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings /
Statement of responsibility, etc edited by Fengjun Li, Kaitai Liang, Zhiqiang Lin, Sokratis K. Katsikas.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2023.
264 #1 -
-- Cham :
-- Springer Nature Switzerland :
-- Imprint: Springer,
-- 2023.
300 ## - PHYSICAL DESCRIPTION
Extent XV, 840 p. 232 illus., 189 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
International Standard Serial Number 1867-822X ;
Volume number/sequential designation 462
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note AI for Security -- Classification-Based Anomaly Prediction in XACML Policies -- An Evolutionary Learning Approach towards the Open Challenge of IoT Device Identification -- SecureBERT: A Domain-Specific Language Model for Cybersecurity -- CapsITD: Malicious Insider Threat Detection Based on Capsule Neural Network -- Towards high transferability on neural network for black-box adversarial attacks -- Coreference Resolution for Cybersecurity Entity: Towards Explicit, Comprehensive Cybersecurity Knowledge Graph with Low Redundancy -- Applied Cryptography -- Another Lattice Attack against ECDSA with the wNAF to Recover More Bits per Signature -- MAG-PUF: Magnetic Physical Unclonable Functions for Device Authentication in the IoT -- A Cross-layer Plausibly Deniable Encryption System for Mobile Devices -- Binary Analysis -- Language and platform independent attribution of heterogeneous code -- Multi-relational Instruction Association Graph for Cross-architecture Binary Similarity Comparison -- Cost-effective malware classification based on deep active learning -- Blockchain -- CTDRB: Controllable Timed Data Release using Blockchains -- FairBlock: Preventing Blockchain Front-running with Minimal Overheads -- Blockchain-based Ciphertext Policy-hiding Access Control Scheme -- Granting Access Privileges using OpenID Connect in Permissioned Distributed Ledgers -- Decentralized and Efficient Blockchain Rewriting with Bi-level Validity Verification -- Cryptography -- TERSE: Tiny Encryptions and Really Speedy Execution for Post-Quantum Private Stream Aggregation -- Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives -- Replicated additive secret sharing with the optimized number of shares -- Generic 2-Party PFE with Constant Rounds and Linear Active Security, and Efficient Instantiation -- Data Security -- A Random Reversible Watermarking Schefme for Relational Data -- Enabling Accurate Data Recovery for Mobile Devices against Malware Attacks -- Bootstrapping Trust in Community Repository Projects -- Intrusion Detection -- Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection -- Forensic Analysis and Detection of Spoofing based Email Attack using Memory Forensics and Machine Learning -- AttackMiner: A Graph Neural Network Based Approach for Attack Detection from Audit Logs -- Hiatus: Unsupervised Generative Approach for Detection of DoS and DDoS Attacks -- Mobile Security -- What Data Do The Google Dialer and Messages Apps On Android Send to Google? -- Detection and Privacy Leakage Analysis of Third-party Libraries in Android Apps -- Secure CV2X using COTS Smartphones over LTE Infrastructure -- Network Security -- DQR: A Double Q Learning Multi Agent Routing Protocol for Wireless Medical Sensor Network -- Message Recovery Attack of Kyber Based on Information Leakage in Decoding Operation -- PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information -- Privacy -- Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly -- MetaPriv: Acting in Favor of Privacy on Social Media Platforms -- Adversary for Social Good: Leveraging AttributeObfuscating Attack to Protect User Privacy on Social Networks -- Software Security -- No-Fuzz: Efficient Anti-Fuzzing Techniques -- eSROP attack: leveraging signal handler to implement Turing-complete attack under CFI defense -- Breaking Embedded Software Homogeneity with Protocol Mutations -- Security and Privacy-preserving Solutions in the Internet of Things (S/P-IoT) -- A Generalized Unknown Malware Classification -- Research on the Grouping Method of Side-Channel Leakage Detection -- PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption With AES and Intel SGX.
520 ## - SUMMARY, ETC.
Summary, etc This book constitutes the refereed proceedings of the 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings. The 43 full papers included in this book were carefully reviewed and selected from 130 submissions. They were organized in topical sections as follows: AI for Security, Applied Cryptography, Binary Analysis, Blockchain, Cryptography, Data Security, Intrusion Detection, Mobile Security, Network Security, Privacy, Software Security, Security and Privacy-preserving Solutions in the Internet of Things (S/P-IoT).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Application software.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Security Services.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Mobile and Network Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer and Information Systems Applications.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Li, Fengjun.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Liang, Kaitai.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Lin, Zhiqiang.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Katsikas, Sokratis K.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783031255373
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9783031255397
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
-- 1867-822X ;
Volume number/sequential designation 462
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-031-25538-0">https://doi.org/10.1007/978-3-031-25538-0</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNS
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in