Applied Cryptography and Network Security Workshops : ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I / / edited by Martin Andreoni
| Applied Cryptography and Network Security Workshops : ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I / / edited by Martin Andreoni |
| Autore | Andreoni Martin |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (413 pages) |
| Disciplina | 005.8 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Computer engineering Computer networks Computers Cryptography Data encryption (Computer science) Computer networks - Security measures Data and Information Security Computer Engineering and Networks Computing Milieux Cryptology Mobile and Network Security Enginyeria d'ordinadors Xarxes d'ordinadors Protecció de dades Criptografia |
| Soggetto genere / forma |
Congressos
Llibres electrònics |
| ISBN |
9783031614866
9783031614859 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | AIBlock – Application Intelligence and Blockchain Security: An End-to-End Secure Solution for IoMT Data Exchange -- EasyLog: An Effcient Kernel Logging Service for Machine Learning -- LM-cAPI:A Lite Model based on API Core Semantic Information for Malware Classification -- ACKI NACKI: a Probabilistic Proof-of-Stake consensus protocol with fast finality and parallelization. AIHWS – Artificial Intelligence in Hardware Security: FPGA Implementation of Physically Unclonable Functions based on Multi-threshold Delay Time Measurement Method to Mitigate Modeling Attacks -- Incorporating Cluster Analysis of Feature Vectors for Non-profiled Deep-learning-based Side-channel Attacks -- Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attacks -- Diversity Algorithms for Laser Fault Injection -- One for All, All for Ascon: Ensemble-based Deep Learning Side-channel Analysis -- CNN architecture extraction on edge GPU -- Harnessing the Power of LLMs in Hardware Trojan Design -- Everything All At Once: Deep Learning Side-Channel Analysis Optimization Framework -- AIoTS – Artificial Intelligence and Industrial IoT Security: Device Fingerprinting in a Smart Grid CPS -- Power Quality Forecasting of Microgrids using Adaptive Privacy-Preserving Machine Learning -- Evaluation of Lightweight Machine Learning-based NIDS Techniques for Industrial IoT -- Measuring Cyber Resilience of IoT-enabled Critical National Infrastructure -- SCI – Secure Cryptographic Implementation: Towards Discovering Quantum-Threats for Applications using Open-Source Libraries -- Pushing AES-256-GCM to Limits: Design, Implementation and Real FPGA Tests -- Automated Generation of Masked Nonlinear Components: From Lookup Tables to Private Circuits -- A Command-Activated Hardware Trojan Detection Method Based on LU-NAR Framework -- Cross-Correlation Based Trace Segmentation for Clustering Power Analysis on Public Key Cryptosystems -- Fully Hybrid TLSv1.3 in WolfSSL on Cortex-M4. |
| Record Nr. | UNINA-9910866573503321 |
Andreoni Martin
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Applied Cryptography and Network Security Workshops : ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II / / edited by Martin Andreoni
| Applied Cryptography and Network Security Workshops : ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II / / edited by Martin Andreoni |
| Autore | Andreoni Martin |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (253 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) | Andreoni |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Computer engineering Computer networks Computers Cryptography Data encryption (Computer science) Computer networks - Security measures Data and Information Security Computer Engineering and Networks Computing Milieux Cryptology Mobile and Network Security Enginyeria d'ordinadors Xarxes d'ordinadors Criptografia Protecció de dades |
| Soggetto genere / forma |
Congressos
Llibres electrònics |
| ISBN | 9783031614897 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | AAC – Workshop on Advances in Asymmetric Cryptanalysis: Forging tropical signatures -- Quantum Circuit Design for the Lee-Brickell based Information Set Decoding -- Projective Space Stern Decoding and Application to SDitH. SiMLA – Security in Machine Learning and its Applications: One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection -- Model Extraction Attack without Natural Images -- Privacy-Preserving Sentiment Analysis using Homomorphic Encryption and Attention Mechanisms -- Differential Privacy with Selected Privacy Budget ϵ in a Cyber Physical System Using Machine Learning. LEE – Low-Latency Encryption: Construction of 4 × 4 Lightweight Low-latency Involutory MDS Matrices CIMSS – Critical Infrastructure and Manufacturing System Security Guidelines for Cyber Risk Management in Autonomous Shipping Identity-based Cluster Authentication and Key Exchange (ID-CAKE) Message Broadcasting and Batch Verification in VANETs. POSTERS: One Time Chat – a toy end-to-end encrypted web messaging service -- Game Theoretic Modeling of Insider Threats in An Organization -- Smart Appliance Abnormal Electrical Power Consumption Detection -- Towards Secure 5G Infrastructures for Production Systems -- Cybersecurity Awareness Education: Just as Useful for Technical Users -- Salsa20 Cipher: Assigning Values to Probabilistic Neutral Key Bits -- A Versatile and Unified HQC Hardware Accelerator -- Applying Self-Recognition Biometrics to Live Deepfake Detection in Video Conferences -- GAN and DM Generated Synthetic Image Detection in the Age of Misinformation -- Extremely Simple Fail-Stop ECDSA Signatures -- Physically Unclonable Fingerprints for Authentication. |
| Record Nr. | UNINA-9910869161603321 |
Andreoni Martin
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||