000 | 03984nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-030-95085-9 | ||
003 | DE-He213 | ||
005 | 20240423125525.0 | ||
007 | cr nn 008mamaa | ||
008 | 220128s2022 sz | s |||| 0|eng d | ||
020 |
_a9783030950859 _9978-3-030-95085-9 |
||
024 | 7 |
_a10.1007/978-3-030-95085-9 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSecurity, Privacy, and Applied Cryptography Engineering _h[electronic resource] : _b11th International Conference, SPACE 2021, Kolkata, India, December 10–13, 2021, Proceedings / _cedited by Lejla Batina, Stjepan Picek, Mainack Mondal. |
250 | _a1st ed. 2022. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2022. |
|
300 |
_aIX, 263 p. 62 illus., 43 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v13162 |
|
505 | 0 | _aSymmetric Cryptography -- Computing the Distribution of Differentials over the Non-linear Mapping -- Light-OCB: Parallel Lightweight Authenticated Cipher with Full Security -- LP Based Differential Attack on Round Reduced WARP -- Post-quantum cryptography and homomorphic encryption -- SHELBRS: Location-Based Recommendation Services using Switchable Homomorphic Encryption -- On Threat of Hardware Trojan To Post-Quantum Lattice-based Schemes: A Key Recovery Attack on SABER and beyond -- Safe-Error Attacks on SIKE and CSIDH -- Hardware security and side-channel attacks -- Network Data Remanence Side Channel Attack on SPREAD, H-SPREAD and Reverse AODV -- Parasite: Mitigating Physical Side-channel Attacks against Neural Networks -- Reinforcement Learning-based Design of Side-channel Countermeasures -- Deep Freezing Attacks on Capacitors and Electronic Circuits -- AI and Cloud security -- Encrypted SQL Arithmetic Functions Processing for Secure Cloud Database -- RobustnessAgainst Adversarial Attacks using Dimensionality -- SoK - Network Intrusion Detection on FPGA. | |
520 | _aThis book constitutes the refereed proceedings of the 11th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2021, held in Kolkata, India, in December 2021. The 13 full papers presented were carefully reviewed and selected from 42 submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aComputer engineering. | |
650 | 0 | _aComputer networks . | |
650 | 0 |
_aImage processing _xDigital techniques. |
|
650 | 0 | _aComputer vision. | |
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputer Engineering and Networks. |
650 | 2 | 4 | _aComputer Imaging, Vision, Pattern Recognition and Graphics. |
700 | 1 |
_aBatina, Lejla. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aPicek, Stjepan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aMondal, Mainack. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030950842 |
776 | 0 | 8 |
_iPrinted edition: _z9783030950866 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v13162 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-95085-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c178872 _d178872 |