000 | 04987nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-981-99-8024-6 | ||
003 | DE-He213 | ||
005 | 20240423130317.0 | ||
007 | cr nn 008mamaa | ||
008 | 240110s2024 si | s |||| 0|eng d | ||
020 |
_a9789819980246 _9978-981-99-8024-6 |
||
024 | 7 |
_a10.1007/978-981-99-8024-6 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aInformation Security Applications _h[electronic resource] : _b24th International Conference, WISA 2023, Jeju Island, South Korea, August 23–25, 2023, Revised Selected Papers / _cedited by Howon Kim, Jonghee Youn. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2024. |
|
300 |
_aXIX, 350 p. 93 illus., 73 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14402 |
|
505 | 0 | _aCryptography -- A New Higher Order Differential of LCB -- Bloomier filters on 3-hypergraphs -- Principal Component Analysis over the Boolean Circuit within TFHE Scheme -- A security analysis on MQ-Sign -- Network and Application Security -- Research on Security Threats Using VPN in Zero Trust Environments -- A Blockchain-based Mobile Crowdsensing and Its Incentive Mechanism -- A New Frontier in Digital Security: Verification for NFT Image using Deep Learning-based ConvNeXt Model in Quantum Blockchain -- AE-LSTM based anomaly detection system for communication over DNP 3.0 -- Privacy & Management -- Systematic Evaluation of Robustness Against Model Inversion Attacks on Split Learning -- Vulnerability Assessment Framework Based on In-the-Wild Exploitability for Prioritizing Patch Application -- Patchman: Firmware Update Delivery Service Over the Blockchain for IoT Environment -- Security Risk Indicator for OpenSource Software to Measure Software Development Status -- Attacks & Defenses -- Defending AirType against Inference Attacks using 3D In-Air Keyboard Layouts: Design and Evaluation -- Robust Training for Deepfake Detection Models Against Disruption Induced Data Poisoning -- Multi-class Malware Detection via Deep Graph Convolutional Networks using TF-IDF-based Attributed Call Graphs -- OCR meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime -- Enriching Vulnerability Reports Through Automated and Augmented Description Summarization -- Cryptography -- Protecting Kernel Code Integrity with PMP on RISC-V -- Exploiting Memory Page Management in KSM for Remote Memory Deduplication Attack -- Mutation Methods for Structured Input to Enhance Path Coverage of Fuzzers -- Improved Differential-Linear Cryptanalysis of Reduced Rounds of ChaCha -- SP-Fuzz: Fuzzing soft PLC with Semi-automated Harness Synthesis -- Post-Quantum Cryptography & Quantum Cryptanalysis -- Post-Quantum Cryptography & Quantum Cryptanalysis -- PQ-DPoL: An Efficient Post-Quantum Blockchain Consensus Algorithm -- Efficient Implementation of the Classic McEliece on ARMv8 processors -- Evaluating KpqC Algorithm Submissions: A Balanced and Clean Benchmarking Approach. | |
520 | _aThis book constitutes the revised selected papers from the 24th International Conference on Information Security Applications, WISA 2023, held in Jeju Island, South Korea, during August 23–25, 2023. The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Cryptography; network and application security; privacy and management; attacks and defenses; post-quantum cryptography and quantum cryptanalysis. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aComputer engineering. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aApplication software. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 1 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputer Engineering and Networks. |
650 | 2 | 4 | _aComputer and Information Systems Applications. |
650 | 2 | 4 | _aMobile and Network Security. |
700 | 1 |
_aKim, Howon. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aYoun, Jonghee. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789819980239 |
776 | 0 | 8 |
_iPrinted edition: _z9789819980253 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14402 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-99-8024-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c187242 _d187242 |