LEADER 00938nam0 22002651i 450 001 UON00518602 005 20231205105534.596 100 $a20231018d1960 |0itac50 ba 101 $ager 102 $aDE 105 $a|||| 1|||| 200 1 $aHalbzeit$eRoman$fMartin Walser 210 $aFrankfurt am Main$cSuhrkamp$dİ1960 215 $a891 p.$d21 cm 606 $aNARRATIVA TEDESCA$3UONC084005$2FI 620 $aDE$dFrankfurt am Main$3UONL003175 676 $a833$cLetteratura narrativa tedesca$v21 700 1$aWALSER$bMartin$3UONV116548$0132578 712 $aSuhrkamp$3UONV260759$4650 801 $aIT$bSOL$c20240220$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00518602 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI F. Goethe 830 WAL 4366 $eSI 46298 5 4366 996 $aHalbzeit$93894754 997 $aUNIOR LEADER 05738nam 22007455 450 001 996668471303316 005 20250712074756.0 010 $a981-9691-01-X 024 7 $a10.1007/978-981-96-9101-2 035 $a(MiAaPQ)EBC32205725 035 $a(Au-PeEL)EBL32205725 035 $a(CKB)39622847000041 035 $a(DE-He213)978-981-96-9101-2 035 $a(EXLCZ)9939622847000041 100 $a20250710d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security and Privacy $e30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14?16, 2025, Proceedings, Part III /$fedited by Willy Susilo, Josef Pieprzyk 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (764 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15660 311 08$a981-9691-00-1 327 $a -- Privacy Enhancing Technologies. -- Comparing and Improving Frequency Estimation Perturbation Mechanisms under Local Differential Privacy. -- Strong Federated Authentication With Password-based Credential Against Identity Server Corruption. -- Anonymous Credentials with Credential Redaction and Its Application to SSI-based Plug Charge for Shared Vehicles. -- Direction-Oriented Smooth Sensitivity and Its Application to Genomic Statistical Analysis. -- Sentence Embedding Generation Method for Differential Privacy Protection. .-KD-IBMRKE-PPFL: A Privacy-Preserving Federated Learning Framework Integrating Knowledge Distillation and Identity-Based Multi-Receiver Key Encapsulation. -- AI Security and Privacy. -- Identifying the Truth of Global Model: A Generic Solution to Defend Against Byzantine and Backdoor Attacks in Federated Learning. .-RAGLeak: Membership Inference Attacks on RAG-Based Large Language Models. -- DeGain: Detecting GAN-based Data Inversion in Collaborative Deep Learning. -- FRFL: Fair and Robust Federated Learning Incentive Model Based on Game Theory. -- DPFedSub: A Differentially Private Federated Learning with Randomized Subspace Descend. -- MG-Det: Deepfake Detection with Multi-Granularity. -- LPIA: Label Preference Inference Attack against Federated Graph Learning. -- DARA: Enhancing Vulnerability Alignment via Adaptive Reconstruction and Dual-Level Attention. -- Zeroth-Order Federated Private Tuning for Pretrained Large Language Models. -- Understanding the Robustness of Machine-Unlearning Models. -- System Security. -- Mitigating the Unprivileged User Namespaces based Privilege Escalation Attacks with Linux Capabilities. -- SoK: From Systematization to Best Practices in Fuzz Driver Generation. -- Facial Authentication Security Evaluation against Deepfake Attacks in Mobile Apps. -- Short Papers. -- EAPIR: Efficient and Authenticated Private Information Retrieval with Fast Server Processing. -- Ransomware Encryption Detection: Adaptive File System Analysis Against Evasive Encryption Tactics. -- Receiver-initiated Updatable Public Key Encryption: Construction, Security and Application. -- Robust and Privacy-Preserving Dynamic Average Consensus with Individual Weight. -- Improving RSA Cryptanalysis: Combining Continued Fractions and Coppersmith?s Techniques. -- Shortest Printable Shellcode Encoding Algorithm Based on Dynamic Bitwidth Selection. -- Position Paper. -- Bridging Clone Detection and Industrial Compliance: A Practical Pipeline for Enterprise Codebases. 330 $aThis three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14?16, 2025. The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed and selected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15660 606 $aData protection 606 $aComputer security 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection$xLaw and legislation 606 $aComputer networks$xSecurity measures 606 $aBlockchains (Databases) 606 $aData and Information Security 606 $aPrinciples and Models of Security 606 $aCryptology 606 $aPrivacy 606 $aMobile and Network Security 606 $aBlockchain 615 0$aData protection. 615 0$aComputer security. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData protection$xLaw and legislation. 615 0$aComputer networks$xSecurity measures. 615 0$aBlockchains (Databases) 615 14$aData and Information Security. 615 24$aPrinciples and Models of Security. 615 24$aCryptology. 615 24$aPrivacy. 615 24$aMobile and Network Security. 615 24$aBlockchain. 676 $a005.8 700 $aSusilo$b Willy$01759814 701 $aPieprzyk$b Josef$0486892 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996668471303316 996 $aInformation Security and Privacy$94406540 997 $aUNISA