LEADER 02260nas 2200733-a 450 001 996209672003316 005 20240413015754.0 011 $a1421-9883 035 $a(CKB)954925495009 035 $a(CONSER)sn-86031010- 035 $a(MiAaPQ)34180 035 $a(DE-599)ZDB1468560-7 035 $a(EXLCZ)99954925495009 100 $a19841106a19849999 --- a 101 0 $aeng 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aDigestive surgery 210 $aBasel ;$aNew York $cS. Karger$d[©1984]- 215 $a1 online resource 300 $aTitle from cover. 300 $aReleased Aug. 1984- 300 $aRefereed/Peer-reviewed 311 $aPrint version: Digestive surgery. (DLC)sn 86031010 (OCoLC)11354687 0253-4886 531 $aDIG SURG 531 $aDIGEST SURG 531 $aDIG. SURG 531 0 $aDig. surg. 606 $aDigestive organs$xSurgery$vPeriodicals 606 $aGastrointestinal system$xSurgery$vPeriodicals 606 $aDigestive organs$xSurgery$2fast$3(OCoLC)fst00893618 606 $aGastrointestinal system$xSurgery$2fast$3(OCoLC)fst00938897 606 $aVerdauungskanal$2gnd 606 $aKrankheit$2gnd 606 $aChirurgie$2gnd 606 $aZeitschrift$2gnd 606 $aOnline-Ressource$2gnd 606 $aChirurgische Krankheit$2gnd 606 $aDigestive System Surgical Procedures 606 $aCirurgia digestiva$2thub 608 $aPeriodicals.$2fast 608 $aFulltext. 608 $aPeriodicals. 608 $aInternet Resources. 608 $aPeriodical. 608 $aRevistes electròniques$2thub 615 0$aDigestive organs$xSurgery 615 0$aGastrointestinal system$xSurgery 615 7$aDigestive organs$xSurgery. 615 7$aGastrointestinal system$xSurgery. 615 7$aVerdauungskanal 615 7$aKrankheit 615 7$aChirurgie 615 7$aZeitschrift 615 7$aOnline-Ressource 615 7$aChirurgische Krankheit 615 2$aDigestive System Surgical Procedures. 615 7$aCirurgia digestiva 906 $aJOURNAL 912 $a996209672003316 920 $aexl_impl conversion 996 $aDigestive surgery$9797742 997 $aUNISA LEADER 08791nam 22008535 450 001 9910746963303321 005 20231003201331.0 010 $a9783031411816 010 $a3031411811 024 7 $a10.1007/978-3-031-41181-6 035 $a(MiAaPQ)EBC30769585 035 $a(Au-PeEL)EBL30769585 035 $a(DE-He213)978-3-031-41181-6 035 $a(PPN)272913499 035 $a(CKB)28449042000041 035 $a(OCoLC)1402279237 035 $a(EXLCZ)9928449042000041 100 $a20231003d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplied Cryptography and Network Security Workshops $eACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19?22, 2023, Proceedings /$fedited by Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Zhang, Yury Zhauniarovich 205 $a1st ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (733 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13907 311 08$aPrint version: Zhou, Jianying Applied Cryptography and Network Security Workshops Cham : Springer,c2023 9783031411809 327 $aADSC ? Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis -- Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis -- Comprehensive Preimage Security Evaluations on Rijndael-based Hashing -- Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak -- AIBlock ? Application Intelligence and Blockchain Security Smart Contract-based E-Voting System Using Homomorphic Encryption and Zero-knowledge Proof -- Preventing Content Cloning in NFT Collections -- NFT Trades in Bitcoin with Off-chain Receipts -- AIHWS ? Artificial Intelligence in Hardware Security A Comparison of Multi-task learning and Single-task learning Approaches -- Hide and Seek: Using Occlusion Techniques for Side-Channel Leakage Attribution in CNNs -- Secret Key Recovery Attack on Masked and Shuffed Implementations of CRYSTALS-Kyber and Saber -- SoK: Assisted Fault Simulation Existing Challenges and Opportunities Offered by AI -- Using Model Optimization as Countermeasure against Model Recovery Attacks -- AIoTS ? Artificial Intelligence and Industrial IoT Security -- Blockchain-enabled Data Sharing in Connected Autonomous Vehicles for Heterogeneous Networks -- A Security Policy Engine for Building Energy Management Systems -- EARIC: Exploiting ADC Registers in IoT and Control Systems -- CIMSS ? Critical Infrastructure and Manufacturing System Security Round-Effcient Security Authentication Protocol for 5G Network -- A Framework for TLS Implementation Vulnerability Testing in 5G -- Safety Watermark: A Defense Tool for Real-Time Digital Forensic Incident Response in Industrial Control Systems -- Leveraging Semantic Relationships to Prioritise Indicators of Compromise in Additive Manufacturing Systems -- WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISM -- Cloud S&P ? Cloud Security and Privacy slytHErin: An Agile Framework for Encrypted Deep Neural Network Inference -- Trust Management Framework for Containerized Workloads ? Applications to 5G Networks -- SCI ? Secure Cryptographic Implementation -- cPSIR: Circuit-based Private Stateful Information Retrieval for Private Media Consumption -- A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers -- Effcient Arithmetic for Polynomial Multiplication in Post-Quantum Lattice-based Cryptosystem on RISC-V Platform -- Generic Constructions of Server-Aided Revocable ABE with Verifiable Transformation -- Hybrid Post-Quantum Signatures in Hardware Security Keys -- Multi-Armed SPHINCS+ -- SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions -- ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret -- SecMT ? Security in Mobile Technologies -- If you?re scanning this, it?s too late! A QR Code-based Fuzzing Methodology to Identify Input Vulnerabilities In Mobile Apps -- Enabling Lightweight Privilege Separation in Applications with MicroGuards -- SiMLA ? Security in Machine Learning and its Applications -- Eliminating Adversarial Perturbations Using Image-to-Image Translation Method -- Federated Learning Approach for Distributed Ransomware Analysis -- Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural Networks -- POSTERS -- Ransomware detection mechanism ? Project status at the beginning of 2023 -- AuthZit: Multi-Modal Authentication with Visual-Spatial and Text Secrets -- Integration of End-to-End Security and Lightweight-SSL for Enhancing Security and Effciency of MQTT -- Stopping Run-time Countermeasures in Cryptographic Primitives -- Swarm-based IoT Network Penetration Testing by IoT Devices -- Advancing Federated Edge Computing with Continual Learning for Secure and Effcient Performance -- A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses -- Integrating Quantum Key Distribution into Hybrid Quantum-Classical Networks -- Adaptive Moving Target Defense: Enhancing Dynamic Perturbation through Voltage Sensitivity Analysis in Power Systems -- PriAuct: Privacy Preserving Auction Mechanism -- Using Verifiable Credentials for Authentication of UAVs in Logistics -- A card-based protocol that lets you know how close two parties are in their opinions (agree/disagree) by using a four-point Likert scale -- Collaborative Authority-Based Searchable Encryption Using Access Control Encryption. 330 $aThis book constitutes the proceedings of the satellite workshops held around the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023. The 34 full papers and 13 poster papers presented in this volume were carefully reviewed and selected from 76 submissions. They stem from the following workshops: · 1st ACNS Workshop on Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis (ADSC 2023) · 5th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2023) · 4th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2023) · 5th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2023) · 3rd ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2023) · 5th ACNS Workshop on Cloud Security and Privacy (Cloud S&P 2023) · 4th ACNS Workshop on Secure Cryptographic Implementation (SCI 2023) · 4th ACNS Workshop on Security in Mobile Technologies (SecMT 2023) · 5th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2023). 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13907 606 $aData protection 606 $aComputer engineering 606 $aComputer networks 606 $aComputers 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aData and Information Security 606 $aComputer Engineering and Networks 606 $aComputing Milieux 606 $aCryptology 606 $aMobile and Network Security 615 0$aData protection. 615 0$aComputer engineering. 615 0$aComputer networks. 615 0$aComputers. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks$xSecurity measures. 615 14$aData and Information Security. 615 24$aComputer Engineering and Networks. 615 24$aComputing Milieux. 615 24$aCryptology. 615 24$aMobile and Network Security. 676 $a005.8 700 $aZhou$b Jianying$0846249 701 $aBatina$b Lejla$0938799 701 $aLi$b Zengpeng$01431346 701 $aLin$b Jingqiang$0938803 701 $aLosiouk$b Eleonora$0938804 701 $aMajumdar$b Suryadipta$0938806 701 $aMashima$b Daisuke$01431347 701 $aMeng$b Weizhi$01067369 701 $aPicek$b Stjepan$01272296 701 $aRahman$b Mohammad Ashiqur$01431348 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910746963303321 996 $aApplied Cryptography and Network Security Workshops$93573674 997 $aUNINA LEADER 01276nam0 22003011i 450 001 UON00382895 005 20231205104536.267 010 $a88-8118-869-4 100 $a20100630d2000 |0itac50 ba 101 $ager 102 $aIT 105 $a|||| 1|||| 200 1 $a7000 Jahre persische Kunst$eMeisterwerke aus dem Iranischen Nationalmuseum in Teheran$eKunsthistorisches Museum, 22. November 2000 bis 25. Ma?rz 2001$fHrsg. von Wilfried Seipel 210 $aMilano$cSkira ; Wien$cKunsthistorisches Museum$d2000 215 $a343 p.$cill., tav.$d28 cm 606 $aArte$xIran$xEsposizioni e mostre$3UONC034178$2FI 620 $aIT$dMilano$3UONL000005 620 $aAT$dWien$3UONL003140 686 $aIR IX L$cIRAN ANTICO - ARTI - ESPOSIZIONI CATALOGHI VENDITE$2A 702 1$aSEIPEL$bWilfried$3UONV013539 712 $aKunsthistorisches Museum$3UONV265578$4650 712 $aSkira$3UONV248966$4650 801 $aIT$bSOL$c20250530$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00382895 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI IR IX L 019 $eSI SA 127387 7 019 996 $a7000 Jahre persische Kunst$91357596 997 $aUNIOR