Information Security
Springer International Publishing (Verlag)
978-3-031-49186-3 (ISBN)
The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis.
Privacy: Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense against Model Inversion Attacks.- Privacy-preserving Medical Data Generation using Adversarial Learning.- Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning.- Intrusion Detection and Systems: SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection.- VNGuard: Intrusion Detection System for In-Vehicle Networks.- RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing.- Machine Learning: Loss and Likelihood Based Membership Inference of Diffusion Models.- Symmetry Defense Against CNN Adversarial Perturbation Attacks.- Web Security: Load-and-Act: Increasing Page Coverage of Web Applications.- From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions.- Mobile Security and Trusted Execution: Libra : Library Identification in Obfuscated Android Apps.- Certificate reuse in Android applications.- TC4SE: A High-performance Trusted Channel Mechanism for Secure Enclave-based Trusted Execution Environments.- Post-Quantum Cryptography: Performance Impact of PQC KEMs on TLS 1.3 under Varying Network Characteristics.- Protecting Private Keys of Dilithium using Hardware Transactional Memory.- Multiparty Computation: Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals.- Evolving Conditional Disclosure of Secrets.- Symmetric Cryptography: Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size.- Impossible Differential Cryptanalysis of the FBC Block Cipher.- Fregata: Faster Homomorphic Evaluation of AES via TFHE.- Key Management: Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography.- On the Privacy-preserving Infrastructure for Authenticated Key Exchange.- Hybrid Group Key Exchange with Application to Constrained Networks.- Functional and Updatable Encryption.- Dynamic Multi-Server Updatable Encryption.- Trace-and-Revoke Quadratic Functional Encryption.- Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings.- Signatures, Hashes, and Cryptanalysis: Robust Property-Preserving Hash Meets Homomorphism.- Withdrawable Signature: How to Call off a Signature.- An Improved BKW Algorithm for Solving LWE with Small Secrets.
Erscheinungsdatum | 01.12.2023 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XIV, 598 p. 130 illus., 79 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 926 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Artificial Intelligence • authentication • Computer Networks • Computer systems • cryptography • Databases • Data communication systems • Data Mining • Data Security • distributed computer systems • Distributed Systems • Encryption • Engineering • Network Protocols • Network Security • parallel processing systems • Public Key Cryptography • Signal Processing • Software Design • Software engineering |
ISBN-10 | 3-031-49186-6 / 3031491866 |
ISBN-13 | 978-3-031-49186-3 / 9783031491863 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich