Advances in Cyber Security: Principles, Techniques, and Applications / / edited by Kuan-Ching Li, Xiaofeng Chen, Willy Susilo
| Advances in Cyber Security: Principles, Techniques, and Applications / / edited by Kuan-Ching Li, Xiaofeng Chen, Willy Susilo |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (270 pages) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory Systems and Data Security Cryptology Coding and Information Theory |
| ISBN | 981-13-1483-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Lightweight Solutions for Public Key Encryption in Resource-Constrained Environments: A Survey of Stateful Public Key Encryption Schemes -- Non-Intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid -- Accountable Anonymous Credentials -- CAPTCHA Design and Security Issues -- Ring Signature -- Data Authentication with Privacy Protection -- A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions -- Pseudonymous Signature Schemes. |
| Record Nr. | UNINA-9910350238003321 |
| Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyberspace safety and security : 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings / / edited by Xiaofeng Chen, Jian Shen, and Willy Susilo
| Cyberspace safety and security : 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings / / edited by Xiaofeng Chen, Jian Shen, and Willy Susilo |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
| Descrizione fisica | 1 online resource (381 pages) |
| Disciplina | 016.391 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data encryption (Computer science)
Computer security |
| ISBN | 3-031-18067-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Cryptography and Its Applications -- Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 2 Preliminaries -- 2.1 RSA Group -- 2.2 RSA Accumulator -- 2.3 Hardness Assumptions -- 2.4 Security Definitions -- 3 Publicly Verifiable SSE Based on Accumulator -- 4 Security Analysis -- 5 Performance Analysis -- 6 Conclusion -- References -- A Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare -- 1 Introduction -- 2 Security Model -- 3 Review and Cryptanalysis of WHX AKA Protocol -- 3.1 Review of WHX AKA Protocol -- 3.2 Cryptanalysis of WHX AKA Protocol -- 4 The Improved Scheme -- 4.1 Initialization Phase -- 4.2 Registration Phase -- 4.3 Authentication and Key Agreement Phase -- 5 Security Analysis of the Proposed Scheme -- 6 Performance Analysis -- 6.1 Security Comparison -- 6.2 Computation Cost -- 6.3 Communication Cost -- 7 Conclusion -- References -- Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q) -- 1 Introduction -- 2 Preliminary -- 2.1 Public Key Cryptosystem Based on Error Correction Codes -- 2.2 Digital Signature Scheme Based on Error Correction Code -- 2.3 Security Concept -- 3 The Proposed Scheme -- 3.1 Reductionist Security Proof -- 4 Performance Analysis of the Proposed Algorithm -- 4.1 Signature Complexity -- 4.2 Public Key Size -- 4.3 Signature Length -- 5 Security Analysis -- 5.1 Information Set Decoding Attack -- 5.2 Distinguisher Attack -- 6 Result -- 7 Conclusions -- References -- A Collaborative Access Control Scheme Based on Incentive Mechanisms -- 1 Introduction -- 2 Related Work -- 3 The Proposed Scheme -- 3.1 Setup -- 3.2 KenGey -- 3.3 Encryption -- 3.4 Decryption -- 3.5 Incentive Mechanism of Blockchain -- 4 Analysis.
4.1 Security Analysis -- 4.2 Performance Analysis -- 5 Conclusion -- References -- Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing -- 1 Introduction -- 1.1 Organization -- 2 Preliminaries -- 2.1 Notations -- 2.2 Sum Arguments of Knowledge -- 2.3 The DL-Based DualRing Signature -- 3 Syntax and Security Model -- 3.1 Syntax of LRS -- 3.2 Security Model -- 4 The Proposed Linkable Ring Signatures -- 4.1 Quartet: a Basic Version -- 4.2 Security Analysis of Quartet -- 4.3 Quartet+: An Improved Version with Logarithmic Size -- 4.4 Security Analysis of Quartet+ -- 5 Evaluation and Analysis -- 5.1 Communication Cost -- 5.2 Computation Cost -- 6 Conclusion -- References -- Updatable Hybrid Encryption Scheme with No-Directional Key Update for Cloud Storage -- 1 Introduction -- 1.1 Our Motivations and Contributions -- 1.2 Related Works -- 2 Preliminaries -- 3 Formal Updatable Hybrid Encryption -- 3.1 Syntax -- 3.2 Instantiation Scheme -- 3.3 Correctness -- 3.4 UP-IND-CCA Security -- 3.5 Evaluation of the Proposed UHE Scheme -- 4 Conclusions -- References -- Data Security -- FDLedger: Dynamic and Efficient Anonymous Audit for Distributed Ledgers -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Related Work -- 2 Preliminaries -- 2.1 Notation -- 2.2 ElGamal Encryption Variant -- 2.3 Order-Revealing Encryption -- 2.4 Consensus -- 3 System Model -- 3.1 Architecture -- 3.2 Assumptions -- 3.3 Security Goals -- 4 FDLedger Construction -- 4.1 Main Idea -- 4.2 Sparse Prefix Symbol Tree -- 4.3 Our Construction -- 4.4 Discussions and Comparisons -- 5 Security Analysis -- 6 Performance Evaluation -- 6.1 Experiment Setup -- 6.2 Experiment Evaluation -- 7 Conclusion -- References -- A Method of Traceless File Deletion for NTFS File System -- 1 Introduction -- 2 Related Work -- 3 Brief Introduction for NTFS File System. 4 A Method of Traceless Data Deletion for NTFS File System -- 4.1 The Requirements of Traceless Data Deletion -- 4.2 A Traceless Method of Data Deletion for NTFS File System -- 5 Performance Analysis -- 5.1 Experiment Result -- 5.2 Performance Analysis -- 6 Conclusion -- References -- Efficient and Collusion Resistant Multi-party Private Set Intersection Protocols for Large Participants and Small Sets Setting -- 1 Introduction -- 1.1 Contributions -- 2 Related Work -- 2.1 Traditional PSI -- 2.2 Collusion Resisting MP-PSI -- 3 Preliminaries -- 3.1 Diffie-Hellman Key Agreement -- 3.2 Zero Sharing Technique -- 4 Security Model -- 4.1 Functionality -- 4.2 Security Definitions -- 5 Concrete Protocols -- 5.1 System Initialization Step -- 5.2 Key Agreement Step -- 5.3 Zero Sharing Step -- 5.4 Intersection Calculation Step -- 6 Security Analysis -- 6.1 Correctness -- 6.2 Security Proof -- 6.3 Malicious Secure MP-PSI -- 7 Performance and Performance -- 7.1 Complexity Analysis -- 7.2 Experimental Implementation -- 7.3 Experiment Results -- 8 Conclusion -- References -- Multi-user Verifiable Database with Efficient Keyword Search -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 1.3 Organization -- 2 Preliminaries -- 2.1 Mathematical Assumption -- 2.2 Verifiable Database (VDB) -- 3 Multi-user Verifiable Database with Efficient Keyword Search -- 3.1 Framework -- 3.2 High Level Description -- 3.3 A Concrete MUVDB Scheme -- 3.4 Extended Construction: Support Conjunctive Keyword Search -- 4 Security and Efficiency Analysis -- 4.1 Security -- 4.2 Comparison -- 5 Conclusion -- References -- A Blockchain-Based Collaborative Auditing Scheme for Cloud Storage -- 1 Introduction -- 1.1 Our Contribution -- 2 Public Provable Data Possession Scheme -- 2.1 System Model -- 2.2 Adversary Model and Design Goals -- 2.3 EigenTrust Model -- 2.4 A Concrete Scheme. 3 Security Analysis and Efficiency Analysis -- 3.1 Correctness -- 3.2 Security Analysis -- 4 Performance Evaluation -- 4.1 Functionality Comparisons -- 4.2 Implementation -- 5 Conclusion -- References -- Attack and Defense Techniques -- High Quality Audio Adversarial Examples Without Using Psychoacoustics -- 1 Introduction -- 2 Related Work -- 3 Problem Definition -- 3.1 Threat Model and Assumptions -- 3.2 Evaluation Metrics -- 4 Method -- 4.1 Adversarial Convolution -- 4.2 Regularization -- 4.3 Impulse Response -- 4.4 Two-Stage Generation Process -- 5 Experimental Results -- 5.1 Setup -- 5.2 Regularization -- 5.3 Adversarial Example Generation -- 5.4 Robustness -- 6 Conclusion and Future Work -- References -- Working Mechanism of Eternalblue and Its Application in Ransomworm -- 1 Introduction -- 2 Eternalblue's Working Mechanism in Metasploit -- 2.1 Crafting Original List -- 2.2 Buffer Grooming -- 2.3 Sending the Shellcode -- 3 Code Analysis -- 3.1 Summary of Wannacry's Network Behaviour -- 3.2 Detailed Analysis of Wannacry Network Behaviour -- 4 Conclusion -- References -- Substitution Attacks Against Sigma Protocols -- 1 Introduction -- 2 Preliminaries -- 2.1 Notations and Definitions -- 2.2 Protocols -- 3 ASA Models for Protocols -- 3.1 Subverting Prover -- 3.2 Subverting Verifier -- 4 Mounting ASAs on Protocols -- 4.1 The Biased-Commitment Attack -- 4.2 The Biased-Challenge Attack -- 5 Instantiations of Subvertible Protocols -- 5.1 Schnorr's Identification Protocol -- 5.2 Okamoto's Protocol for Representations -- 6 Conclusion -- References -- A Multi-stage APT Attack Detection Method Based on Sample Enhancement -- 1 Introduction -- 2 Related Work -- 3 Multi-stage APT Attack Detection Method Based on Sample Enhancement -- 3.1 Multi-stage Sample Enhancement -- 3.2 Multi-stage APT Attack Detection -- 4 Experimental Results. 4.1 Environment and Evaluation Metrics -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- References -- VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer -- 1 Introduction -- 2 Overview -- 3 VDHGT Method -- 3.1 Generation of VDRG -- 3.2 Node Embedding -- 3.3 Graph Learning Network and Vulnerability Detection -- 4 Experiment and Result Analysis -- 4.1 Experimental Dataset -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- References -- Anomalous Network Traffic Detection Based on CK Sketch and Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Sketch Structure -- 2.2 Sketch Improvement Structure on the Basis of Cuckoo Hash -- 3 Anomalous Network Traffic Detection Solution on the Basis of Machine Learning and CK Sketch -- 3.1 Design of the Anomalous Network Traffic Detection Process -- 3.2 CK Sketch Structure Improvement -- 4 Experience -- 4.1 Experimental Environment and Data Set -- 4.2 Metrics -- 4.3 Experimental Comparison Analysis -- 5 Conclusion -- References -- FedMCS: A Privacy-Preserving Mobile Crowdsensing Defense Scheme -- 1 Introduction -- 2 Related Works -- 3 Problem Formulation -- 3.1 System Model -- 3.2 Threat Model -- 3.3 Design Goals -- 4 Preliminaries -- 4.1 Notations -- 4.2 Poisoning Attack -- 4.3 Paillier Encryption System -- 5 Proposed Scheme -- 5.1 Request Task Publishing -- 5.2 Sensing Gradient Uploading -- 5.3 Model Secure Aggregation -- 6 Safety Certificate -- 7 Performance Evaluation -- 7.1 Experimental Settings -- 7.2 Experiment Results -- 8 Conclusion -- References -- Membership Inference Attacks Against Robust Graph Neural Network -- 1 Introduction -- 2 Related Work -- 2.1 Graph Convolutional Networks -- 2.2 Graph Adversarial Training -- 2.3 Graph Inference Attacks -- 3 Background -- 3.1 Graph Convolutional Network -- 3.2 Graph Membership Inference Attacks. 3.3 Graph Adversarial Training. |
| Record Nr. | UNISA-996490358003316 |
| Cham, Switzerland : , : Springer, , [2022] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Cyberspace Safety and Security : 14th International Symposium, CSS 2022, Xi'an, China, October 16–18, 2022, Proceedings / / edited by Xiaofeng Chen, Jian Shen, Willy Susilo
| Cyberspace Safety and Security : 14th International Symposium, CSS 2022, Xi'an, China, October 16–18, 2022, Proceedings / / edited by Xiaofeng Chen, Jian Shen, Willy Susilo |
| Edizione | [1st ed. 2022.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
| Descrizione fisica | 1 online resource (381 pages) |
| Disciplina |
016.391
005.8 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Computers Image processing - Digital techniques Computer vision Artificial intelligence Data and Information Security Cryptology Computing Milieux Computer Imaging, Vision, Pattern Recognition and Graphics Artificial Intelligence |
| ISBN |
9783031180675
3031180674 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Cryptography and its applications -- Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead -- Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare -- Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q) -- A Collaborative Access Control Scheme based on Incentive Mechanism -- Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing -- Updatable Hybrid Encryption Scheme with No-directional Key Update for Cloud Storage -- Data security -- FDLedger: Dynamic and Efficient Anonymous Audit for Distributed Ledgers -- A Method of Traceless File Deletion for NTFS File System -- Efficient and Collusion Resistant Multi-Party Private Set Intersection Protocols for Large Participants and Small Sets Setting -- Attack and defense techniques -- High Quality Audio Adversarial Examples without Using Psychoacoustics -- Working Mechanism of Eternalblue and Its Application in Ransomworm -- Substitution Attacks against Sigma Protocols -- A Multi-stage APT Attack Detection Method based on Sample Enhancement -- VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer -- Network security and its applications -- Improvised Model for Blockchain in Distributed Cloud Environment -- Multi-hop Multi-key Homomorphic Encryption with Less Noise under CRS Model -- Design of Anti-machine Learning Malicious Node System based on Blockchain. |
| Record Nr. | UNINA-9910616395803321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Data Security and Privacy Protection : Second International Conference, DSPP 2024, Xi'an, China, October 25–28, 2024, Proceedings, Part II / / edited by Xiaofeng Chen, Xinyi Huang, Moti Yung
| Data Security and Privacy Protection : Second International Conference, DSPP 2024, Xi'an, China, October 25–28, 2024, Proceedings, Part II / / edited by Xiaofeng Chen, Xinyi Huang, Moti Yung |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (XIV, 268 p. 84 illus., 72 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Data protection - Law and legislation Cryptography Data encryption (Computer science) Computer security Computer networks - Security measures Data and Information Security Privacy Cryptology Security Services Principles and Models of Security Mobile and Network Security |
| ISBN |
9789819785469
9819785464 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910983347403321 |
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Data Security and Privacy Protection : Second International Conference, DSPP 2024, Xi'an, China, October 25–28, 2024, Proceedings, Part I / / edited by Xiaofeng Chen, Xinyi Huang, Moti Yung
| Data Security and Privacy Protection : Second International Conference, DSPP 2024, Xi'an, China, October 25–28, 2024, Proceedings, Part I / / edited by Xiaofeng Chen, Xinyi Huang, Moti Yung |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (XIV, 314 p. 76 illus., 49 illus. in color.) |
| Disciplina | 005.8 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Data protection - Law and legislation Cryptography Data encryption (Computer science) Computer security Computer networks - Security measures Data and Information Security Privacy Cryptology Security Services Principles and Models of Security Mobile and Network Security |
| ISBN |
9789819785407
9819785405 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910983479803321 |
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information and Communications Security [[electronic resource] ] : 25th International Conference, ICICS 2023, Tianjin, China, November 18–20, 2023, Proceedings / / edited by Ding Wang, Moti Yung, Zheli Liu, Xiaofeng Chen
| Information and Communications Security [[electronic resource] ] : 25th International Conference, ICICS 2023, Tianjin, China, November 18–20, 2023, Proceedings / / edited by Ding Wang, Moti Yung, Zheli Liu, Xiaofeng Chen |
| Autore | Wang Ding |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (773 pages) |
| Disciplina |
005.73
003.54 |
| Altri autori (Persone) |
YungMoti
LiuZheli ChenXiaofeng |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data structures (Computer science)
Information theory Database management Data mining Application software Image processing - Digital techniques Computer vision Cryptography Data encryption (Computer science) Data Structures and Information Theory Database Management Data Mining and Knowledge Discovery Computer and Information Systems Applications Computer Imaging, Vision, Pattern Recognition and Graphics Cryptology |
| ISBN | 981-9973-56-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Symmetric-Key Cryptography -- SAT-aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA -- Improved Related-Key Rectangle Attack against the Full AES-192 -- Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM -- Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher -- PAE: Towards More Efficient and BBB-secure AE From a Single Public Permutation -- Public-Key Cryptography -- A Polynomial-time Attack on G2SIDH -- Improvements of Homomorphic Secure Evaluation of Inverse Square Root -- Oblivious Transfer from Rerandomizable PKE -- Forward Secure Lattice-based Ring Signature Scheme in the Standard Model -- Applied Cryptography -- Secure Multi-Party Computation with Legally-Enforceable Fairness -- On-demand Allocation of Cryptographic Computing Resource with Load Prediction -- Private Message Franking with After Opening Privacy -- Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction -- Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography -- Authentication and Authorization -- PiXi: Password Inspiration by Exploring Information -- Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris Verification -- A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things -- BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks -- Privacy and Anonymity -- Link Prediction-Based Multi-Identity Recognition of Darknet Vendors -- CryptoMask: Privacy-preserving Face Recognition -- Efficient Private Multiset ID Protocols -- Zoomer: A Website Fingerprinting Attack against Tor Hidden Services -- An Enhanced Privacy-preserving Hierarchical Federated Learning Framework for IoV -- Security and Privacy of AI -- Revisiting the Deep Learning-based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors -- Multi-scale Features Destructive Universal Adversarial Perturbations -- Pixel-Wise Reconstruction of Private Data in Split Federated Learning -- Neural Network Backdoor Attacks Fully Controlled by Composite Natural Utterance Fragments -- Black-Box Fairness Testing with Shadow Models -- Graph Unlearning using Knowledge Distillation -- AFLOW: Developing Adversarial Examples under Extremely Noise-limited Settings -- Learning to Detect Deepfakes via Adaptive Attention and Constrained Difference -- A Novel Deep Ensemble Framework for Online Signature Verification Using Temporal and Spatial Representation -- Blockchain and Cryptocurrencies -- SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains -- Subsidy Bridge: Rewarding Cross-blockchain Relayers with Subsidy -- Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-based Cryptocurrency Transactions -- Blockchain based Publicly Auditable Multi-Party Computation with Cheater Detection -- BDTS: Blockchain-based Data Trading System -- Illegal Accounts Detection on Ethereum using Heterogeneous Graph Transformer Networks -- System and Network security -- DRoT: A Decentralised Root of Trust for Trusted Networks -- Finding Missing Security Operation Bugs via Program Slicing and Differential Check -- TimeClave: Oblivious In-enclave Time series Processing System -- Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios -- A Fake News Detection Method Based on A Multimodal Cooperative Attention Network. |
| Record Nr. | UNISA-996558467003316 |
Wang Ding
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information and Communications Security : 25th International Conference, ICICS 2023, Tianjin, China, November 18–20, 2023, Proceedings / / edited by Ding Wang, Moti Yung, Zheli Liu, Xiaofeng Chen
| Information and Communications Security : 25th International Conference, ICICS 2023, Tianjin, China, November 18–20, 2023, Proceedings / / edited by Ding Wang, Moti Yung, Zheli Liu, Xiaofeng Chen |
| Autore | Wang Ding |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (773 pages) |
| Disciplina |
005.73
003.54 |
| Altri autori (Persone) |
YungMoti
LiuZheli ChenXiaofeng |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data structures (Computer science)
Information theory Database management Data mining Application software Image processing - Digital techniques Computer vision Cryptography Data encryption (Computer science) Data Structures and Information Theory Database Management Data Mining and Knowledge Discovery Computer and Information Systems Applications Computer Imaging, Vision, Pattern Recognition and Graphics Cryptology |
| ISBN |
9789819973569
9819973562 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Symmetric-Key Cryptography -- SAT-aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA -- Improved Related-Key Rectangle Attack against the Full AES-192 -- Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM -- Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher -- PAE: Towards More Efficient and BBB-secure AE From a Single Public Permutation -- Public-Key Cryptography -- A Polynomial-time Attack on G2SIDH -- Improvements of Homomorphic Secure Evaluation of Inverse Square Root -- Oblivious Transfer from Rerandomizable PKE -- Forward Secure Lattice-based Ring Signature Scheme in the Standard Model -- Applied Cryptography -- Secure Multi-Party Computation with Legally-Enforceable Fairness -- On-demand Allocation of Cryptographic Computing Resource with Load Prediction -- Private Message Franking with After Opening Privacy -- Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction -- Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography -- Authentication and Authorization -- PiXi: Password Inspiration by Exploring Information -- Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris Verification -- A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things -- BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks -- Privacy and Anonymity -- Link Prediction-Based Multi-Identity Recognition of Darknet Vendors -- CryptoMask: Privacy-preserving Face Recognition -- Efficient Private Multiset ID Protocols -- Zoomer: A Website Fingerprinting Attack against Tor Hidden Services -- An Enhanced Privacy-preserving Hierarchical Federated Learning Framework for IoV -- Security and Privacy of AI -- Revisiting the Deep Learning-based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors -- Multi-scale Features Destructive Universal Adversarial Perturbations -- Pixel-Wise Reconstruction of Private Data in Split Federated Learning -- Neural Network Backdoor Attacks Fully Controlled by Composite Natural Utterance Fragments -- Black-Box Fairness Testing with Shadow Models -- Graph Unlearning using Knowledge Distillation -- AFLOW: Developing Adversarial Examples under Extremely Noise-limited Settings -- Learning to Detect Deepfakes via Adaptive Attention and Constrained Difference -- A Novel Deep Ensemble Framework for Online Signature Verification Using Temporal and Spatial Representation -- Blockchain and Cryptocurrencies -- SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains -- Subsidy Bridge: Rewarding Cross-blockchain Relayers with Subsidy -- Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-based Cryptocurrency Transactions -- Blockchain based Publicly Auditable Multi-Party Computation with Cheater Detection -- BDTS: Blockchain-based Data Trading System -- Illegal Accounts Detection on Ethereum using Heterogeneous Graph Transformer Networks -- System and Network security -- DRoT: A Decentralised Root of Trust for Trusted Networks -- Finding Missing Security Operation Bugs via Program Slicing and Differential Check -- TimeClave: Oblivious In-enclave Time series Processing System -- Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios -- A Fake News Detection Method Based on A Multimodal Cooperative Attention Network. |
| Record Nr. | UNINA-9910754093503321 |
Wang Ding
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information Security and Cryptology [[electronic resource] ] : 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers / / edited by Xiaofeng Chen, Dongdai Lin, Moti Yung
| Information Security and Cryptology [[electronic resource] ] : 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers / / edited by Xiaofeng Chen, Dongdai Lin, Moti Yung |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
| Descrizione fisica | 1 online resource (XXI, 530 p. 84 illus.) |
| Disciplina | 303.4834 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory Computers and civilization Computers Law and legislation Data mining Systems and Data Security Cryptology Coding and Information Theory Computers and Society Legal Aspects of Computing Data Mining and Knowledge Discovery |
| ISBN | 3-319-75160-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996465302903316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information Security and Cryptology : 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers / / edited by Xiaofeng Chen, Dongdai Lin, Moti Yung
| Information Security and Cryptology : 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers / / edited by Xiaofeng Chen, Dongdai Lin, Moti Yung |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
| Descrizione fisica | 1 online resource (XXI, 530 p. 84 illus.) |
| Disciplina | 303.4834 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory Computers and civilization Computers Law and legislation Data mining Systems and Data Security Cryptology Coding and Information Theory Computers and Society Legal Aspects of Computing Data Mining and Knowledge Discovery |
| ISBN |
9783319751603
3319751603 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910349460403321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Introduction to Cryptographic Definitions : A Step-by-Step Guide for Beginners / / by Fuchun Guo, Willy Susilo, Khoa Nguyen, Xiaofeng Chen, Zhen Zhao
| Introduction to Cryptographic Definitions : A Step-by-Step Guide for Beginners / / by Fuchun Guo, Willy Susilo, Khoa Nguyen, Xiaofeng Chen, Zhen Zhao |
| Autore | Guo Fuchun |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (0 pages) |
| Disciplina | 005.824 |
| Altri autori (Persone) |
SusiloWilly
NguyenKhoa ChenXiaofeng ZhaoZhen |
| Collana | Undergraduate Topics in Computer Science |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Data protection Cryptology Data and Information Security |
| ISBN | 3-031-91969-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Overview of Cryptographic Definitions -- Mathematics -- Computing Machines -- Computational Complexity -- From Computational Complexity to Cryptography -- Cryptographic Primitives for Syntax Definitions -- Cryptographic Primitives for Security Definitions -- Other Readings. |
| Record Nr. | UNINA-9911010531003321 |
Guo Fuchun
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||