04339nam 22007935 450 991048447930332120251225174951.03-030-72725-410.1007/978-3-030-72725-3(CKB)4100000011867296(MiAaPQ)EBC6533379(Au-PeEL)EBL6533379(OCoLC)1245670242(PPN)255290608(BIP)79756672(BIP)79290859(DE-He213)978-3-030-72725-3(EXLCZ)99410000001186729620210401d2021 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierSilicon Valley Cybersecurity Conference First Conference, SVCC 2020, San Jose, CA, USA, December 17–19, 2020, Revised Selected Papers /edited by Younghee Park, Divyesh Jadav, Thomas Austin1st ed. 2021.Cham :Springer International Publishing :Imprint: Springer,2021.1 online resource (232 pages) illustrationsCommunications in Computer and Information Science,1865-0937 ;13833-030-72724-6 Includes bibliographical references and index.Dynamic Security Analysis of Zoom, Google Meet and Microsoft Teams -- A Secure Encapsulation Schemes based on Key Recovery System -- Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator -- STRISA: A New Regulation Architecture to Enforce Travel Rule -- Post-Quantum Hash-Based Signatures for Secure Boot -- Exploring the Coverage of Existing Hardware Vulnerabilities in Community Standards -- MurQRI: Encrypted Multi-Layer QR Codes for Electronic Identity Management -- SpartanGold: A Blockchain for Education, Experimentation, and Rapid Prototyping -- BIOT: A blockchain-based IoT Platform for Distributed Energy Resource Management -- A Privacy Preserving E-voting System based on Blockchain -- Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity -- ConTheModel: Can we modify tweets to confuse classifier models? -- A Systematic Approach to Building Autoencoders for Intrusion Detection -- An Attack on Quantum Circuits Based on the Error Rates of NISQ Systems and a Countermeasure -- Cryptocurrency with Multiple Sequence Alignment Proof-of-Work -- IoT Checker Using Timing Side-channel and Machine Learning.This book constitutes selected and revised papers from the First Silicon Valley Cybersecurity Conference, held in San Jose, USA, in December 2020. Due to the COVID-19 pandemic the conference was held in a virtual format. The 9 full papers and 6 short papers presented in this volume were thoroughly reviewed and selected from 30 submissions. They present most recent research on dependability, reliability, and security to address cyber-attacks, vulnerabilities,faults, and errors in networks and systems.Communications in Computer and Information Science,1865-0937 ;1383Data protectionDatabase managementComputer networksComputersComputer systemsArtificial intelligenceData and Information SecurityDatabase Management SystemComputer Communication NetworksComputing MilieuxComputer System ImplementationArtificial IntelligenceData protection.Database management.Computer networks.Computers.Computer systems.Artificial intelligence.Data and Information Security.Database Management System.Computer Communication Networks.Computing Milieux.Computer System Implementation.Artificial Intelligence.005.8Austin Thomas1966-Jadav DivyeshPark YoungheeMiAaPQMiAaPQMiAaPQBOOK9910484479303321Silicon valley cybersecurity conference2814722UNINA