| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910495220103321 |
|
|
Titolo |
Advances in Information and Computer Security : 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8–10, 2021, Proceedings / / edited by Toru Nakanishi, Ryo Nojima |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2021.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (250 pages) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology, , 2946-1863 ; ; 12835 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Computer engineering |
Computer networks |
Data and Information Security |
Computer Engineering and Networks |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Lattice-Based Cryptography A trace map attack against special ring-LWE samples -- Shortest Vectors in Lattices of Bai-Galbraith’s Embedding Attack on the LWR Problem -- System Security KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption -- Evidence Collection and Preservation System with Virtual Machine Monitoring -- Multiparty Computation Evolving Homomorphic Secret Sharing for Hierarchical Access Structures -- Machine Learning and Security Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions -- Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language -- Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices -- FFT Program Generation for Ring LWE-based Cryptography -- Symmetric-key Cryptography Optimum Attack on 3-Round Feistel-2 Structure -- Post-quantum Cryptography (2) An Intermediate Secret-Guessing Attack on Hash-Based Signatures -- Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH -- Simple Matrix Signature Scheme -- Game Theory and Security Moving Target Defense for the CloudControl Game. |
|
|
|
|
|
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, Japan in September 2021. The conference was held virtually due to COVID-19 pandemic. The 14 regular papers and 3 short paper presented in this volume were carefully reviewed and selected from 37 submissions. They were organized in topical sections named: Lattice-Based Cryptography; System Security; Multiparty Computation; Machine Learning and Security; Post-quantum Cryptography; Symmetric-key Cryptography; Game Theory and Security. |
|
|
|
|
|
|
|
| |