LEADER 04170nam 22006375 450 001 9910887888703321 005 20251225202112.0 010 $a981-9777-37-2 024 7 $a10.1007/978-981-97-7737-2 035 $a(MiAaPQ)EBC31674257 035 $a(Au-PeEL)EBL31674257 035 $a(CKB)35309378300041 035 $a(DE-He213)978-981-97-7737-2 035 $a(EXLCZ)9935309378300041 100 $a20240913d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Information and Computer Security $e19th International Workshop on Security, IWSEC 2024, Kyoto, Japan, September 17?19, 2024, Proceedings /$fedited by Kazuhiko Minematsu, Mamoru Mimura 205 $a1st ed. 2024. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2024. 215 $a1 online resource (310 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v14977 300 $aIncludes index. 311 08$a981-9777-36-4 327 $a -- Authenticated Encryption. -- Bit-wise Analysis for Forgery Attacks on AES-based AEAD Schemes. -- Cryptanalysis of Authenticated Encryption Modes for Wireless and Real-Time Systems. -- Symmetric-key Cryptanalysis. -- Higher-order Mixture Differentials for AES-based Block Ciphers and Applications to TweAES. -- Weak Keys of the Full MISTY1 Recovered in Practical Time. -- Protocols. -- Efficient Card-Based Protocols with a Standard Deck of Playing Cards Using Partial Opening. -- Attribute-Based Inner Product Functional Encryption in Key-Policy Setting from Pairing. -- Analysis of Public-key Cryptosystems. -- Formal Verification of Emulated Floating-Point Arithmetic in Falcon. -- Experimental Analysis of Integer Factorization Methods Using Lattices. -- Sieving Method for SDP with the Zero Window: An Improvement in Low Memory Environments. -- Vulnerability. -- Race condition vulnerabilities in WordPress plug-ins. -- Finding (and exploiting) vulnerabilities on IP Cameras: the Tenda CP3 case study. -- Malware Countermeasure. -- File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems. -- Implementation for Malicious Software using ChatGPT-4. -- A Markov Game Model for Evaluating Cybersecurity Attacks on Cloud. -- Network Security and Privacy. -- Few Edges Are Enough: Few-Shot Network Attack Detection with Graph Neural Networks. -- Information Leakage through Packet Lengths in RTC Traffic. -- A Study on Anonymization through Participation in iPWS Cup 2023. 330 $aThis book constitutes the proceedings of the 19th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2024, held in Kyoto, Japan, in September 17-19, 2024. The 14 full papers and 3 short papers were carefully reviewed and selected from 47 submissions. These papers were categorized into the following sections: authenticated encryption; symmetric-key cryptanalysis; protocols; analysis of public-key cryptosystems; vulnerability; malware countermeasure; network security and privacy. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v14977 606 $aData protection 606 $aApplication software 606 $aComputers 606 $aComputer networks 606 $aData and Information Security 606 $aComputer and Information Systems Applications 606 $aComputing Milieux 606 $aComputer Communication Networks 615 0$aData protection. 615 0$aApplication software. 615 0$aComputers. 615 0$aComputer networks. 615 14$aData and Information Security. 615 24$aComputer and Information Systems Applications. 615 24$aComputing Milieux. 615 24$aComputer Communication Networks. 676 $a005.8 702 $aMinematsu$b Kazuhiko 702 $aMimura$b Mamoru 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910887888703321 996 $aAdvances in Information and Computer Security$92904912 997 $aUNINA