Advances in Information and Computer Security
Springer International Publishing (Verlag)
978-3-030-85986-2 (ISBN)
Lattice-Based Cryptography A trace map attack against special ring-LWE samples.- Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem.- System Security KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption.- Evidence Collection and Preservation System with Virtual Machine Monitoring.- Multiparty Computation Evolving Homomorphic Secret Sharing for Hierarchical Access Structures.- Machine Learning and Security Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions.- Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language.- Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices.- FFT Program Generation for Ring LWE-based Cryptography.- Symmetric-key Cryptography Optimum Attack on 3-Round Feistel-2 Structure.- Post-quantum Cryptography (2) An Intermediate Secret-Guessing Attack on Hash-Based Signatures.- Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH.- Simple Matrix Signature Scheme.- Game Theory and Security Moving Target Defense for the CloudControl Game.
Erscheinungsdatum | 29.08.2021 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 253 p. 55 illus., 34 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 410 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Weitere Themen ► Hardware | |
Schlagworte | Applications • Artificial Intelligence • authentication • Communication Systems • computer crime • Computer Hardware • Computer Networks • Computer Science • Computer Security • Computer systems • conference proceedings • cryptography • cybersecurity • Databases • Data Security • distributed computer systems • Engineering • Informatics • machine learning • Network Protocols • Network Security • post-quantum cryptography • Public Key Cryptography • Research • Signal Processing |
ISBN-10 | 3-030-85986-X / 303085986X |
ISBN-13 | 978-3-030-85986-2 / 9783030859862 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich