LEADER 05486nam 22007215 450 001 9910983327203321 005 20250606234451.0 010 $a3-031-64948-6 024 7 $a10.1007/978-3-031-64948-6 035 $a(MiAaPQ)EBC31725011 035 $a(Au-PeEL)EBL31725011 035 $a(CKB)36340902900041 035 $a(DE-He213)978-3-031-64948-6 035 $a(EXLCZ)9936340902900041 100 $a20241012d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and Privacy in Communication Networks $e19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I /$fedited by Haixin Duan, Mourad Debbabi, Xavier de Carné de Carnavalet, Xiapu Luo, Xiaojiang Du, Man Ho Allen Au 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (543 pages) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v567 311 08$a3-031-64947-8 327 $aAI for Security -- Classify Me Correctly if You Can Evaluating Adversarial Machine Learning Threats in NIDS -- CUFT Cuflow based Approach with Multi headed Attention Mechanism for Encrypted Traffic Classification -- CyberEA An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph -- DNN Architecture Attacks via Network and Power Side Channels -- Invisibility Spell Adversarial Patch Attack Against Object Detectors -- Meta Perturbation Generation Network for Text based CAPTCHA -- Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks -- Unsupervised Multi Criteria Adversarial Detection in Deep Image Retrieval -- VRC GraphNet A Graph Neural Network based Reasoning Framework for Attacking Visual Reasoning Captchas -- Authentication -- An Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density -- Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home -- Optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller -- Blockchain and Distributed System Security -- Byzantine Protocols with Asymptotically Optimal Communication Complexity -- Demystifying Blockchain Scalability Sibling Chains with Minimal Interleaving -- VDABSys A novel security testing framework for blockchain systems based on vulnerability detection. Cryptography -- Anonymous Key Issuing Protocol with Certified Identities in Identity based Encryption -- Batch Lattice Based Designated Verifier ZK SNARKs for R1CS -- Certificateless Aggregate Signature Without Trapdoor for Cloud Storage -- Efficient Zero Knowledge for Regular Language -- Enabling Fast Settlement in Atomic Cross-Chain Swaps -- HeSUN Homomorphic Encryption for Secure Unbounded Neural Network Inference -- Optimization of Functional Bootstraps with Large LUT and Packing Key Switching -- Data Security -- An Authentication Algorithm for Sets of Spatial Data Objects -- An Efficient Private Information Retrieval Protocol Based on TFHE -- mShield Protect In-process Sensitive Data Against Vulnerable Third Party Libraries -- Password Cracking by Exploiting User Group Information. 330 $aThis two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China. The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows: Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security. Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v567 606 $aComputer networks$xSecurity measures 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aApplication software 606 $aMobile and Network Security 606 $aData and Information Security 606 $aCryptology 606 $aSecurity Services 606 $aComputer and Information Systems Applications 615 0$aComputer networks$xSecurity measures. 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aApplication software. 615 14$aMobile and Network Security. 615 24$aData and Information Security. 615 24$aCryptology. 615 24$aSecurity Services. 615 24$aComputer and Information Systems Applications. 676 $a005.8 700 $aDuan$b Haixin$01786141 701 $aDebbabi$b Mourad$01786142 701 $ade Carné de Carnavalet$b Xavier$01786143 701 $aLuo$b Xiapu$01786144 701 $aDu$b Xiaojiang$01753681 701 $aAu$b Man-Ho$01432908 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910983327203321 996 $aSecurity and Privacy in Communication Networks$94389337 997 $aUNINA