Information Security and Cryptology (Record no. 187121)

MARC details
000 -LEADER
fixed length control field 05459nam a22006735i 4500
001 - CONTROL NUMBER
control field 978-981-97-0945-8
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240423130310.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240224s2024 si | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789819709458
-- 978-981-97-0945-8
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-981-97-0945-8
Source of number or code doi
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
245 10 - TITLE STATEMENT
Title Information Security and Cryptology
Medium [electronic resource] :
Remainder of title 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part II /
Statement of responsibility, etc edited by Chunpeng Ge, Moti Yung.
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2024.
264 #1 -
-- Singapore :
-- Springer Nature Singapore :
-- Imprint: Springer,
-- 2024.
300 ## - PHYSICAL DESCRIPTION
Extent XVII, 419 p. 114 illus., 90 illus. in color.
Other physical details online resource.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
International Standard Serial Number 1611-3349 ;
Volume number/sequential designation 14527
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note System Security: Text Laundering: Mitigating Malicious Features through Knowledge Distillation of Language Foundation Models -- An Android Malware Detection Method Using Better API Contextual Information -- TAElog: A Novel Transformer AutoEncoder-based Log Anomaly Detection Method -- EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch Operation -- Clustered Federated Learning with Inference Hash Codes based Local Sensitive Hashing -- TIA: Token Importance Transferable Attack on Vision Transformers -- Cryptography Engineering: Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber -- V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture -- Cryptanalysis: Improved Integral Cryptanalysis of Block Ciphers BORON and Khudr -- Automatic Search of Linear Structure: Applications to Keccak and Ascon -- Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128 -- Improved Herrmann-May’s Attack with Merging Variables and Lower LLL Bound -- Full Round Distinguishing and Key-Recovery Attacks on SAND-2 -- Real-time Symbolic Reasoning Framework for Cryptojacking Detection Based on Netflow-plus Analysis -- Non-malleable Codes from Leakage Resilient Cryptographic Primitives -- Short paper: DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy -- A Practical Multi-Candidate Voting Protocol on Quantum Blockchain Adapted for Various Tally Principles -- Quantum Augmented Lattice Attack on NTRU with Side Information -- Quantum Attacks: A View of Data Complexity on Offline Simon’s Algorithm -- FaBFT: Flexible Asynchronous BFT Protocol Using DAG -- Forward Secure Online/offline Key Policy Attribute-based Encryption with Multi-keyword Search -- Differential Privacy Enhanced Dynamic Searchable Symmetric Encryption for Cloud Environments -- Poster: An Efficient Privacy-preserving Scheme for Weak Password Collection in Internet of Things -- TRGE: A Backdoor Detection after Quantizatio -- Improved Homomorphic Evaluation for Hash Function based on TFHE -- Power of Randomness Recovery: Tightly CCA-Secure KEM in the QROM -- Partial Key Exposure Attack on Common Prime RSA -- An Efficient Autonomous Path Proxy Re-Encryption without Pairing for Cloud-assisted mHealth.
520 ## - SUMMARY, ETC.
Summary, etc The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9–10, 2023. The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: Part I: Signature; blockchain; cryptography primitive; public key cryptography; security and privacy; Part II: System security; cryptography engineering; cryptanalysis; short papers, posters.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data protection.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Image processing
General subdivision Digital techniques.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer vision.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks .
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Application software.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science).
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data and Information Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Imaging, Vision, Pattern Recognition and Graphics.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer and Information Systems Applications.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Mobile and Network Security.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptology.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ge, Chunpeng.
Relator term editor.
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Yung, Moti.
Relator term editor.
-- (orcid)
-- 0000-0003-0848-0873
Relator code edt
-- http://id.loc.gov/vocabulary/relators/edt
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer Nature eBook
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9789819709441
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9789819709465
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture Notes in Computer Science,
-- 1611-3349 ;
Volume number/sequential designation 14527
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-981-97-0945-8">https://doi.org/10.1007/978-981-97-0945-8</a>
912 ## -
-- ZDB-2-SCS
912 ## -
-- ZDB-2-SXCS
912 ## -
-- ZDB-2-LNC
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks-CSE-Springer

No items available.

© 2024 IIIT-Delhi, library@iiitd.ac.in