LEADER 04339nam 22007935 450 001 9910484479303321 005 20251225174951.0 010 $a3-030-72725-4 024 7 $a10.1007/978-3-030-72725-3 035 $a(CKB)4100000011867296 035 $a(MiAaPQ)EBC6533379 035 $a(Au-PeEL)EBL6533379 035 $a(OCoLC)1245670242 035 $a(PPN)255290608 035 $a(BIP)79756672 035 $a(BIP)79290859 035 $a(DE-He213)978-3-030-72725-3 035 $a(EXLCZ)994100000011867296 100 $a20210401d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSilicon Valley Cybersecurity Conference $eFirst Conference, SVCC 2020, San Jose, CA, USA, December 17?19, 2020, Revised Selected Papers /$fedited by Younghee Park, Divyesh Jadav, Thomas Austin 205 $a1st ed. 2021. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2021. 215 $a1 online resource (232 pages) $cillustrations 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1383 311 08$a3-030-72724-6 320 $aIncludes bibliographical references and index. 327 $aDynamic Security Analysis of Zoom, Google Meet and Microsoft Teams -- A Secure Encapsulation Schemes based on Key Recovery System -- Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator -- STRISA: A New Regulation Architecture to Enforce Travel Rule -- Post-Quantum Hash-Based Signatures for Secure Boot -- Exploring the Coverage of Existing Hardware Vulnerabilities in Community Standards -- MurQRI: Encrypted Multi-Layer QR Codes for Electronic Identity Management -- SpartanGold: A Blockchain for Education, Experimentation, and Rapid Prototyping -- BIOT: A blockchain-based IoT Platform for Distributed Energy Resource Management -- A Privacy Preserving E-voting System based on Blockchain -- Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity -- ConTheModel: Can we modify tweets to confuse classifier models? -- A Systematic Approach to Building Autoencoders for Intrusion Detection -- An Attack on Quantum Circuits Based on the Error Rates of NISQ Systems and a Countermeasure -- Cryptocurrency with Multiple Sequence Alignment Proof-of-Work -- IoT Checker Using Timing Side-channel and Machine Learning. 330 $aThis book constitutes selected and revised papers from the First Silicon Valley Cybersecurity Conference, held in San Jose, USA, in December 2020. Due to the COVID-19 pandemic the conference was held in a virtual format. The 9 full papers and 6 short papers presented in this volume were thoroughly reviewed and selected from 30 submissions. They present most recent research on dependability, reliability, and security to address cyber-attacks, vulnerabilities,faults, and errors in networks and systems. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1383 606 $aData protection 606 $aDatabase management 606 $aComputer networks 606 $aComputers 606 $aComputer systems 606 $aArtificial intelligence 606 $aData and Information Security 606 $aDatabase Management System 606 $aComputer Communication Networks 606 $aComputing Milieux 606 $aComputer System Implementation 606 $aArtificial Intelligence 615 0$aData protection. 615 0$aDatabase management. 615 0$aComputer networks. 615 0$aComputers. 615 0$aComputer systems. 615 0$aArtificial intelligence. 615 14$aData and Information Security. 615 24$aDatabase Management System. 615 24$aComputer Communication Networks. 615 24$aComputing Milieux. 615 24$aComputer System Implementation. 615 24$aArtificial Intelligence. 676 $a005.8 702 $aAustin$b Thomas$f1966- 702 $aJadav$b Divyesh 702 $aPark$b Younghee 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484479303321 996 $aSilicon valley cybersecurity conference$92814722 997 $aUNINA