top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Cyber Security: Principles, Techniques, and Applications / / edited by Kuan-Ching Li, Xiaofeng Chen, Willy Susilo
Advances in Cyber Security: Principles, Techniques, and Applications / / edited by Kuan-Ching Li, Xiaofeng Chen, Willy Susilo
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (270 pages)
Disciplina 005.8
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
Systems and Data Security
Cryptology
Coding and Information Theory
ISBN 981-13-1483-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Lightweight Solutions for Public Key Encryption in Resource-Constrained Environments: A Survey of Stateful Public Key Encryption Schemes -- Non-Intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid -- Accountable Anonymous Credentials -- CAPTCHA Design and Security Issues -- Ring Signature -- Data Authentication with Privacy Protection -- A Methodology for Retrofitting Privacy and Its Application to e-Shopping Transactions -- Pseudonymous Signature Schemes.
Record Nr. UNINA-9910350238003321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cyberspace safety and security : 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings / / edited by Xiaofeng Chen, Jian Shen, and Willy Susilo
Cyberspace safety and security : 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings / / edited by Xiaofeng Chen, Jian Shen, and Willy Susilo
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (381 pages)
Disciplina 016.391
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer security
ISBN 3-031-18067-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Cryptography and Its Applications -- Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 2 Preliminaries -- 2.1 RSA Group -- 2.2 RSA Accumulator -- 2.3 Hardness Assumptions -- 2.4 Security Definitions -- 3 Publicly Verifiable SSE Based on Accumulator -- 4 Security Analysis -- 5 Performance Analysis -- 6 Conclusion -- References -- A Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare -- 1 Introduction -- 2 Security Model -- 3 Review and Cryptanalysis of WHX AKA Protocol -- 3.1 Review of WHX AKA Protocol -- 3.2 Cryptanalysis of WHX AKA Protocol -- 4 The Improved Scheme -- 4.1 Initialization Phase -- 4.2 Registration Phase -- 4.3 Authentication and Key Agreement Phase -- 5 Security Analysis of the Proposed Scheme -- 6 Performance Analysis -- 6.1 Security Comparison -- 6.2 Computation Cost -- 6.3 Communication Cost -- 7 Conclusion -- References -- Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q) -- 1 Introduction -- 2 Preliminary -- 2.1 Public Key Cryptosystem Based on Error Correction Codes -- 2.2 Digital Signature Scheme Based on Error Correction Code -- 2.3 Security Concept -- 3 The Proposed Scheme -- 3.1 Reductionist Security Proof -- 4 Performance Analysis of the Proposed Algorithm -- 4.1 Signature Complexity -- 4.2 Public Key Size -- 4.3 Signature Length -- 5 Security Analysis -- 5.1 Information Set Decoding Attack -- 5.2 Distinguisher Attack -- 6 Result -- 7 Conclusions -- References -- A Collaborative Access Control Scheme Based on Incentive Mechanisms -- 1 Introduction -- 2 Related Work -- 3 The Proposed Scheme -- 3.1 Setup -- 3.2 KenGey -- 3.3 Encryption -- 3.4 Decryption -- 3.5 Incentive Mechanism of Blockchain -- 4 Analysis.
4.1 Security Analysis -- 4.2 Performance Analysis -- 5 Conclusion -- References -- Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing -- 1 Introduction -- 1.1 Organization -- 2 Preliminaries -- 2.1 Notations -- 2.2 Sum Arguments of Knowledge -- 2.3 The DL-Based DualRing Signature -- 3 Syntax and Security Model -- 3.1 Syntax of LRS -- 3.2 Security Model -- 4 The Proposed Linkable Ring Signatures -- 4.1 Quartet: a Basic Version -- 4.2 Security Analysis of Quartet -- 4.3 Quartet+: An Improved Version with Logarithmic Size -- 4.4 Security Analysis of Quartet+ -- 5 Evaluation and Analysis -- 5.1 Communication Cost -- 5.2 Computation Cost -- 6 Conclusion -- References -- Updatable Hybrid Encryption Scheme with No-Directional Key Update for Cloud Storage -- 1 Introduction -- 1.1 Our Motivations and Contributions -- 1.2 Related Works -- 2 Preliminaries -- 3 Formal Updatable Hybrid Encryption -- 3.1 Syntax -- 3.2 Instantiation Scheme -- 3.3 Correctness -- 3.4 UP-IND-CCA Security -- 3.5 Evaluation of the Proposed UHE Scheme -- 4 Conclusions -- References -- Data Security -- FDLedger: Dynamic and Efficient Anonymous Audit for Distributed Ledgers -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Related Work -- 2 Preliminaries -- 2.1 Notation -- 2.2 ElGamal Encryption Variant -- 2.3 Order-Revealing Encryption -- 2.4 Consensus -- 3 System Model -- 3.1 Architecture -- 3.2 Assumptions -- 3.3 Security Goals -- 4 FDLedger Construction -- 4.1 Main Idea -- 4.2 Sparse Prefix Symbol Tree -- 4.3 Our Construction -- 4.4 Discussions and Comparisons -- 5 Security Analysis -- 6 Performance Evaluation -- 6.1 Experiment Setup -- 6.2 Experiment Evaluation -- 7 Conclusion -- References -- A Method of Traceless File Deletion for NTFS File System -- 1 Introduction -- 2 Related Work -- 3 Brief Introduction for NTFS File System.
4 A Method of Traceless Data Deletion for NTFS File System -- 4.1 The Requirements of Traceless Data Deletion -- 4.2 A Traceless Method of Data Deletion for NTFS File System -- 5 Performance Analysis -- 5.1 Experiment Result -- 5.2 Performance Analysis -- 6 Conclusion -- References -- Efficient and Collusion Resistant Multi-party Private Set Intersection Protocols for Large Participants and Small Sets Setting -- 1 Introduction -- 1.1 Contributions -- 2 Related Work -- 2.1 Traditional PSI -- 2.2 Collusion Resisting MP-PSI -- 3 Preliminaries -- 3.1 Diffie-Hellman Key Agreement -- 3.2 Zero Sharing Technique -- 4 Security Model -- 4.1 Functionality -- 4.2 Security Definitions -- 5 Concrete Protocols -- 5.1 System Initialization Step -- 5.2 Key Agreement Step -- 5.3 Zero Sharing Step -- 5.4 Intersection Calculation Step -- 6 Security Analysis -- 6.1 Correctness -- 6.2 Security Proof -- 6.3 Malicious Secure MP-PSI -- 7 Performance and Performance -- 7.1 Complexity Analysis -- 7.2 Experimental Implementation -- 7.3 Experiment Results -- 8 Conclusion -- References -- Multi-user Verifiable Database with Efficient Keyword Search -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 1.3 Organization -- 2 Preliminaries -- 2.1 Mathematical Assumption -- 2.2 Verifiable Database (VDB) -- 3 Multi-user Verifiable Database with Efficient Keyword Search -- 3.1 Framework -- 3.2 High Level Description -- 3.3 A Concrete MUVDB Scheme -- 3.4 Extended Construction: Support Conjunctive Keyword Search -- 4 Security and Efficiency Analysis -- 4.1 Security -- 4.2 Comparison -- 5 Conclusion -- References -- A Blockchain-Based Collaborative Auditing Scheme for Cloud Storage -- 1 Introduction -- 1.1 Our Contribution -- 2 Public Provable Data Possession Scheme -- 2.1 System Model -- 2.2 Adversary Model and Design Goals -- 2.3 EigenTrust Model -- 2.4 A Concrete Scheme.
3 Security Analysis and Efficiency Analysis -- 3.1 Correctness -- 3.2 Security Analysis -- 4 Performance Evaluation -- 4.1 Functionality Comparisons -- 4.2 Implementation -- 5 Conclusion -- References -- Attack and Defense Techniques -- High Quality Audio Adversarial Examples Without Using Psychoacoustics -- 1 Introduction -- 2 Related Work -- 3 Problem Definition -- 3.1 Threat Model and Assumptions -- 3.2 Evaluation Metrics -- 4 Method -- 4.1 Adversarial Convolution -- 4.2 Regularization -- 4.3 Impulse Response -- 4.4 Two-Stage Generation Process -- 5 Experimental Results -- 5.1 Setup -- 5.2 Regularization -- 5.3 Adversarial Example Generation -- 5.4 Robustness -- 6 Conclusion and Future Work -- References -- Working Mechanism of Eternalblue and Its Application in Ransomworm -- 1 Introduction -- 2 Eternalblue's Working Mechanism in Metasploit -- 2.1 Crafting Original List -- 2.2 Buffer Grooming -- 2.3 Sending the Shellcode -- 3 Code Analysis -- 3.1 Summary of Wannacry's Network Behaviour -- 3.2 Detailed Analysis of Wannacry Network Behaviour -- 4 Conclusion -- References -- Substitution Attacks Against Sigma Protocols -- 1 Introduction -- 2 Preliminaries -- 2.1 Notations and Definitions -- 2.2 Protocols -- 3 ASA Models for Protocols -- 3.1 Subverting Prover -- 3.2 Subverting Verifier -- 4 Mounting ASAs on Protocols -- 4.1 The Biased-Commitment Attack -- 4.2 The Biased-Challenge Attack -- 5 Instantiations of Subvertible Protocols -- 5.1 Schnorr's Identification Protocol -- 5.2 Okamoto's Protocol for Representations -- 6 Conclusion -- References -- A Multi-stage APT Attack Detection Method Based on Sample Enhancement -- 1 Introduction -- 2 Related Work -- 3 Multi-stage APT Attack Detection Method Based on Sample Enhancement -- 3.1 Multi-stage Sample Enhancement -- 3.2 Multi-stage APT Attack Detection -- 4 Experimental Results.
4.1 Environment and Evaluation Metrics -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- References -- VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer -- 1 Introduction -- 2 Overview -- 3 VDHGT Method -- 3.1 Generation of VDRG -- 3.2 Node Embedding -- 3.3 Graph Learning Network and Vulnerability Detection -- 4 Experiment and Result Analysis -- 4.1 Experimental Dataset -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- References -- Anomalous Network Traffic Detection Based on CK Sketch and Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Sketch Structure -- 2.2 Sketch Improvement Structure on the Basis of Cuckoo Hash -- 3 Anomalous Network Traffic Detection Solution on the Basis of Machine Learning and CK Sketch -- 3.1 Design of the Anomalous Network Traffic Detection Process -- 3.2 CK Sketch Structure Improvement -- 4 Experience -- 4.1 Experimental Environment and Data Set -- 4.2 Metrics -- 4.3 Experimental Comparison Analysis -- 5 Conclusion -- References -- FedMCS: A Privacy-Preserving Mobile Crowdsensing Defense Scheme -- 1 Introduction -- 2 Related Works -- 3 Problem Formulation -- 3.1 System Model -- 3.2 Threat Model -- 3.3 Design Goals -- 4 Preliminaries -- 4.1 Notations -- 4.2 Poisoning Attack -- 4.3 Paillier Encryption System -- 5 Proposed Scheme -- 5.1 Request Task Publishing -- 5.2 Sensing Gradient Uploading -- 5.3 Model Secure Aggregation -- 6 Safety Certificate -- 7 Performance Evaluation -- 7.1 Experimental Settings -- 7.2 Experiment Results -- 8 Conclusion -- References -- Membership Inference Attacks Against Robust Graph Neural Network -- 1 Introduction -- 2 Related Work -- 2.1 Graph Convolutional Networks -- 2.2 Graph Adversarial Training -- 2.3 Graph Inference Attacks -- 3 Background -- 3.1 Graph Convolutional Network -- 3.2 Graph Membership Inference Attacks.
3.3 Graph Adversarial Training.
Record Nr. UNISA-996490358003316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cyberspace Safety and Security : 14th International Symposium, CSS 2022, Xi'an, China, October 16–18, 2022, Proceedings / / edited by Xiaofeng Chen, Jian Shen, Willy Susilo
Cyberspace Safety and Security : 14th International Symposium, CSS 2022, Xi'an, China, October 16–18, 2022, Proceedings / / edited by Xiaofeng Chen, Jian Shen, Willy Susilo
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (381 pages)
Disciplina 016.391
005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computers
Image processing - Digital techniques
Computer vision
Artificial intelligence
Data and Information Security
Cryptology
Computing Milieux
Computer Imaging, Vision, Pattern Recognition and Graphics
Artificial Intelligence
ISBN 9783031180675
3031180674
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography and its applications -- Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead -- Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare -- Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q) -- A Collaborative Access Control Scheme based on Incentive Mechanism -- Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing -- Updatable Hybrid Encryption Scheme with No-directional Key Update for Cloud Storage -- Data security -- FDLedger: Dynamic and Efficient Anonymous Audit for Distributed Ledgers -- A Method of Traceless File Deletion for NTFS File System -- Efficient and Collusion Resistant Multi-Party Private Set Intersection Protocols for Large Participants and Small Sets Setting -- Attack and defense techniques -- High Quality Audio Adversarial Examples without Using Psychoacoustics -- Working Mechanism of Eternalblue and Its Application in Ransomworm -- Substitution Attacks against Sigma Protocols -- A Multi-stage APT Attack Detection Method based on Sample Enhancement -- VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer -- Network security and its applications -- Improvised Model for Blockchain in Distributed Cloud Environment -- Multi-hop Multi-key Homomorphic Encryption with Less Noise under CRS Model -- Design of Anti-machine Learning Malicious Node System based on Blockchain.
Record Nr. UNINA-9910616395803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data Security and Privacy Protection : Second International Conference, DSPP 2024, Xi'an, China, October 25–28, 2024, Proceedings, Part II / / edited by Xiaofeng Chen, Xinyi Huang, Moti Yung
Data Security and Privacy Protection : Second International Conference, DSPP 2024, Xi'an, China, October 25–28, 2024, Proceedings, Part II / / edited by Xiaofeng Chen, Xinyi Huang, Moti Yung
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XIV, 268 p. 84 illus., 72 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data protection - Law and legislation
Cryptography
Data encryption (Computer science)
Computer security
Computer networks - Security measures
Data and Information Security
Privacy
Cryptology
Security Services
Principles and Models of Security
Mobile and Network Security
ISBN 9789819785469
9819785464
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910983347403321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data Security and Privacy Protection : Second International Conference, DSPP 2024, Xi'an, China, October 25–28, 2024, Proceedings, Part I / / edited by Xiaofeng Chen, Xinyi Huang, Moti Yung
Data Security and Privacy Protection : Second International Conference, DSPP 2024, Xi'an, China, October 25–28, 2024, Proceedings, Part I / / edited by Xiaofeng Chen, Xinyi Huang, Moti Yung
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XIV, 314 p. 76 illus., 49 illus. in color.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data protection - Law and legislation
Cryptography
Data encryption (Computer science)
Computer security
Computer networks - Security measures
Data and Information Security
Privacy
Cryptology
Security Services
Principles and Models of Security
Mobile and Network Security
ISBN 9789819785407
9819785405
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910983479803321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and Communications Security [[electronic resource] ] : 25th International Conference, ICICS 2023, Tianjin, China, November 18–20, 2023, Proceedings / / edited by Ding Wang, Moti Yung, Zheli Liu, Xiaofeng Chen
Information and Communications Security [[electronic resource] ] : 25th International Conference, ICICS 2023, Tianjin, China, November 18–20, 2023, Proceedings / / edited by Ding Wang, Moti Yung, Zheli Liu, Xiaofeng Chen
Autore Wang Ding
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (773 pages)
Disciplina 005.73
003.54
Altri autori (Persone) YungMoti
LiuZheli
ChenXiaofeng
Collana Lecture Notes in Computer Science
Soggetto topico Data structures (Computer science)
Information theory
Database management
Data mining
Application software
Image processing - Digital techniques
Computer vision
Cryptography
Data encryption (Computer science)
Data Structures and Information Theory
Database Management
Data Mining and Knowledge Discovery
Computer and Information Systems Applications
Computer Imaging, Vision, Pattern Recognition and Graphics
Cryptology
ISBN 981-9973-56-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Symmetric-Key Cryptography -- SAT-aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA -- Improved Related-Key Rectangle Attack against the Full AES-192 -- Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM -- Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher -- PAE: Towards More Efficient and BBB-secure AE From a Single Public Permutation -- Public-Key Cryptography -- A Polynomial-time Attack on G2SIDH -- Improvements of Homomorphic Secure Evaluation of Inverse Square Root -- Oblivious Transfer from Rerandomizable PKE -- Forward Secure Lattice-based Ring Signature Scheme in the Standard Model -- Applied Cryptography -- Secure Multi-Party Computation with Legally-Enforceable Fairness -- On-demand Allocation of Cryptographic Computing Resource with Load Prediction -- Private Message Franking with After Opening Privacy -- Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction -- Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography -- Authentication and Authorization -- PiXi: Password Inspiration by Exploring Information -- Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris Verification -- A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things -- BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks -- Privacy and Anonymity -- Link Prediction-Based Multi-Identity Recognition of Darknet Vendors -- CryptoMask: Privacy-preserving Face Recognition -- Efficient Private Multiset ID Protocols -- Zoomer: A Website Fingerprinting Attack against Tor Hidden Services -- An Enhanced Privacy-preserving Hierarchical Federated Learning Framework for IoV -- Security and Privacy of AI -- Revisiting the Deep Learning-based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors -- Multi-scale Features Destructive Universal Adversarial Perturbations -- Pixel-Wise Reconstruction of Private Data in Split Federated Learning -- Neural Network Backdoor Attacks Fully Controlled by Composite Natural Utterance Fragments -- Black-Box Fairness Testing with Shadow Models -- Graph Unlearning using Knowledge Distillation -- AFLOW: Developing Adversarial Examples under Extremely Noise-limited Settings -- Learning to Detect Deepfakes via Adaptive Attention and Constrained Difference -- A Novel Deep Ensemble Framework for Online Signature Verification Using Temporal and Spatial Representation -- Blockchain and Cryptocurrencies -- SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains -- Subsidy Bridge: Rewarding Cross-blockchain Relayers with Subsidy -- Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-based Cryptocurrency Transactions -- Blockchain based Publicly Auditable Multi-Party Computation with Cheater Detection -- BDTS: Blockchain-based Data Trading System -- Illegal Accounts Detection on Ethereum using Heterogeneous Graph Transformer Networks -- System and Network security -- DRoT: A Decentralised Root of Trust for Trusted Networks -- Finding Missing Security Operation Bugs via Program Slicing and Differential Check -- TimeClave: Oblivious In-enclave Time series Processing System -- Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios -- A Fake News Detection Method Based on A Multimodal Cooperative Attention Network.
Record Nr. UNISA-996558467003316
Wang Ding  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communications Security : 25th International Conference, ICICS 2023, Tianjin, China, November 18–20, 2023, Proceedings / / edited by Ding Wang, Moti Yung, Zheli Liu, Xiaofeng Chen
Information and Communications Security : 25th International Conference, ICICS 2023, Tianjin, China, November 18–20, 2023, Proceedings / / edited by Ding Wang, Moti Yung, Zheli Liu, Xiaofeng Chen
Autore Wang Ding
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (773 pages)
Disciplina 005.73
003.54
Altri autori (Persone) YungMoti
LiuZheli
ChenXiaofeng
Collana Lecture Notes in Computer Science
Soggetto topico Data structures (Computer science)
Information theory
Database management
Data mining
Application software
Image processing - Digital techniques
Computer vision
Cryptography
Data encryption (Computer science)
Data Structures and Information Theory
Database Management
Data Mining and Knowledge Discovery
Computer and Information Systems Applications
Computer Imaging, Vision, Pattern Recognition and Graphics
Cryptology
ISBN 9789819973569
9819973562
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Symmetric-Key Cryptography -- SAT-aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA -- Improved Related-Key Rectangle Attack against the Full AES-192 -- Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM -- Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher -- PAE: Towards More Efficient and BBB-secure AE From a Single Public Permutation -- Public-Key Cryptography -- A Polynomial-time Attack on G2SIDH -- Improvements of Homomorphic Secure Evaluation of Inverse Square Root -- Oblivious Transfer from Rerandomizable PKE -- Forward Secure Lattice-based Ring Signature Scheme in the Standard Model -- Applied Cryptography -- Secure Multi-Party Computation with Legally-Enforceable Fairness -- On-demand Allocation of Cryptographic Computing Resource with Load Prediction -- Private Message Franking with After Opening Privacy -- Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction -- Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography -- Authentication and Authorization -- PiXi: Password Inspiration by Exploring Information -- Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris Verification -- A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things -- BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks -- Privacy and Anonymity -- Link Prediction-Based Multi-Identity Recognition of Darknet Vendors -- CryptoMask: Privacy-preserving Face Recognition -- Efficient Private Multiset ID Protocols -- Zoomer: A Website Fingerprinting Attack against Tor Hidden Services -- An Enhanced Privacy-preserving Hierarchical Federated Learning Framework for IoV -- Security and Privacy of AI -- Revisiting the Deep Learning-based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors -- Multi-scale Features Destructive Universal Adversarial Perturbations -- Pixel-Wise Reconstruction of Private Data in Split Federated Learning -- Neural Network Backdoor Attacks Fully Controlled by Composite Natural Utterance Fragments -- Black-Box Fairness Testing with Shadow Models -- Graph Unlearning using Knowledge Distillation -- AFLOW: Developing Adversarial Examples under Extremely Noise-limited Settings -- Learning to Detect Deepfakes via Adaptive Attention and Constrained Difference -- A Novel Deep Ensemble Framework for Online Signature Verification Using Temporal and Spatial Representation -- Blockchain and Cryptocurrencies -- SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains -- Subsidy Bridge: Rewarding Cross-blockchain Relayers with Subsidy -- Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-based Cryptocurrency Transactions -- Blockchain based Publicly Auditable Multi-Party Computation with Cheater Detection -- BDTS: Blockchain-based Data Trading System -- Illegal Accounts Detection on Ethereum using Heterogeneous Graph Transformer Networks -- System and Network security -- DRoT: A Decentralised Root of Trust for Trusted Networks -- Finding Missing Security Operation Bugs via Program Slicing and Differential Check -- TimeClave: Oblivious In-enclave Time series Processing System -- Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios -- A Fake News Detection Method Based on A Multimodal Cooperative Attention Network.
Record Nr. UNINA-9910754093503321
Wang Ding  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Cryptology [[electronic resource] ] : 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers / / edited by Xiaofeng Chen, Dongdai Lin, Moti Yung
Information Security and Cryptology [[electronic resource] ] : 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers / / edited by Xiaofeng Chen, Dongdai Lin, Moti Yung
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XXI, 530 p. 84 illus.)
Disciplina 303.4834
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
Computers and civilization
Computers
Law and legislation
Data mining
Systems and Data Security
Cryptology
Coding and Information Theory
Computers and Society
Legal Aspects of Computing
Data Mining and Knowledge Discovery
ISBN 3-319-75160-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465302903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Cryptology : 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers / / edited by Xiaofeng Chen, Dongdai Lin, Moti Yung
Information Security and Cryptology : 13th International Conference, Inscrypt 2017, Xi'an, China, November 3–5, 2017, Revised Selected Papers / / edited by Xiaofeng Chen, Dongdai Lin, Moti Yung
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XXI, 530 p. 84 illus.)
Disciplina 303.4834
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Coding theory
Information theory
Computers and civilization
Computers
Law and legislation
Data mining
Systems and Data Security
Cryptology
Coding and Information Theory
Computers and Society
Legal Aspects of Computing
Data Mining and Knowledge Discovery
ISBN 9783319751603
3319751603
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910349460403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Introduction to Cryptographic Definitions : A Step-by-Step Guide for Beginners / / by Fuchun Guo, Willy Susilo, Khoa Nguyen, Xiaofeng Chen, Zhen Zhao
Introduction to Cryptographic Definitions : A Step-by-Step Guide for Beginners / / by Fuchun Guo, Willy Susilo, Khoa Nguyen, Xiaofeng Chen, Zhen Zhao
Autore Guo Fuchun
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (0 pages)
Disciplina 005.824
Altri autori (Persone) SusiloWilly
NguyenKhoa
ChenXiaofeng
ZhaoZhen
Collana Undergraduate Topics in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Data protection
Cryptology
Data and Information Security
ISBN 3-031-91969-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Overview of Cryptographic Definitions -- Mathematics -- Computing Machines -- Computational Complexity -- From Computational Complexity to Cryptography -- Cryptographic Primitives for Syntax Definitions -- Cryptographic Primitives for Security Definitions -- Other Readings.
Record Nr. UNINA-9911010531003321
Guo Fuchun  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Opere

Altro...

Lingua di pubblicazione

Altro...

Data

Data di pubblicazione

Altro...