000 03849nam a22005775i 4500
001 978-3-030-85987-9
003 DE-He213
005 20240423125114.0
007 cr nn 008mamaa
008 210826s2021 sz | s |||| 0|eng d
020 _a9783030859879
_9978-3-030-85987-9
024 7 _a10.1007/978-3-030-85987-9
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aAdvances in Information and Computer Security
_h[electronic resource] :
_b16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8–10, 2021, Proceedings /
_cedited by Toru Nakanishi, Ryo Nojima.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aXII, 253 p. 55 illus., 34 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v12835
505 0 _aLattice-Based Cryptography A trace map attack against special ring-LWE samples -- Shortest Vectors in Lattices of Bai-Galbraith’s Embedding Attack on the LWR Problem -- System Security KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption -- Evidence Collection and Preservation System with Virtual Machine Monitoring -- Multiparty Computation Evolving Homomorphic Secret Sharing for Hierarchical Access Structures -- Machine Learning and Security Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions -- Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language -- Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices -- FFT Program Generation for Ring LWE-based Cryptography -- Symmetric-key Cryptography Optimum Attack on 3-Round Feistel-2 Structure -- Post-quantum Cryptography (2) An Intermediate Secret-Guessing Attack on Hash-Based Signatures -- Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH -- Simple Matrix Signature Scheme -- Game Theory and Security Moving Target Defense for the CloudControl Game.
520 _aThis book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, Japan in September 2021. The conference was held virtually due to COVID-19 pandemic. The 14 regular papers and 3 short paper presented in this volume were carefully reviewed and selected from 37 submissions. They were organized in topical sections named: Lattice-Based Cryptography; System Security; Multiparty Computation; Machine Learning and Security; Post-quantum Cryptography; Symmetric-key Cryptography; Game Theory and Security.
650 0 _aData protection.
650 0 _aComputer engineering.
650 0 _aComputer networks .
650 1 4 _aData and Information Security.
650 2 4 _aComputer Engineering and Networks.
650 2 4 _aComputer Engineering and Networks.
700 1 _aNakanishi, Toru.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aNojima, Ryo.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030859862
776 0 8 _iPrinted edition:
_z9783030859886
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v12835
856 4 0 _uhttps://doi.org/10.1007/978-3-030-85987-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c174311
_d174311