Information Security
Springer International Publishing (Verlag)
978-3-031-75756-3 (ISBN)
The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23-25, 2024.
The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections:
Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security.
Part II - Web Security; Intrusion Detection.
.- Blockchain.
.- The Formal Verification of Aptos Coin.
.- Anonymous, Timed and Revocable Proxy Signatures.
.- Symmetric-Key Cryptography.
.- MILP/MIQCP-Based Differential-Linear Cryptanalysis on CHAM-64/128.
.- Security Analysis of CMAC in the Multi-User Model.
.- Quantum Key Recovery Attacks on 4-round Iterated Even-Mansour with Two Keys.
.- Machine Learning.
.- Optimizing label-only membership inference attacks by global relative decision boundary distances.
.- Risk of Text Backdoor Attacks under Dataset Distillation.
.- Mobile Security and Trusted Execution.
.- Emulating Android Device Drivers via Borrowed Execution Context.
.- Software Security.
.- SyzLego: Enhancing Kernel Directed Greybox Fuzzing via Dependency Inference and Scheduling.
.- A Lightweight Defense Scheme against Usermode Helper Privilege Escalation Using Linux Capability.
.- Multi-Party Computation.
.- Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles.
.- ChronoCloak: An integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination.
.- Large-Plaintext Functional Bootstrapping with Small Parameters for BGV Encoding.
.- Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations.
.- Robust Multiparty Computation from Threshold Encryption Based on RLWE.
.- Efficient Blind Rotation in FHEW using Refined Decomposition and NTT.
.- Post-Quantum Cryptography.
.- Solving McEliece-1409 in One Day - Cryptanalysis with the Improved BJMM Algorithm.
.- Deep LLL on Module lattices.
.- Multi-way High-throughput Implementation of Kyber.
.- The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys.
.- A faster variant of CGL hash function via efficient backtracking checks.
.- Streamlining CSIDH: Cost-Effective Strategies for Group Actions Evaluation.
.- System Security.
.- Channel Robust Strategies with Data Augmentation for Audio Anti-Spoofing.
.- Property Guided Secure Configuration Space Search.
.- Adversarial analysis of software composition analysis tools.
.- News Reader: A News Interest Identification Attack using Single-Electrode Brainwave Signals.
Erscheinungsdatum | 24.10.2024 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XIV, 336 p. 65 illus., 38 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | block and stream ciphers • cryptanalysis and other attacks • cryptographic primitives • cryptographic protocols • Digital Signatures • hash functions and message authentication codes • Intrusion Detection Systems • Malware • Mobile and wireless security • Phishing • public key encryption • security protocols • Software Security • Systems Security • web security |
ISBN-10 | 3-031-75756-4 / 3031757564 |
ISBN-13 | 978-3-031-75756-3 / 9783031757563 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich