top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Foundations and Practice of Security : 15th International Symposium, FPS 2022, Ottawa, on, Canada, December 12-14, 2022, Revised Selected Papers / / Guy-Vincent Jourdan [and four others], editors
Foundations and Practice of Security : 15th International Symposium, FPS 2022, Ottawa, on, Canada, December 12-14, 2022, Revised Selected Papers / / Guy-Vincent Jourdan [and four others], editors
Edizione [First edition.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023]
Descrizione fisica 1 online resource (478 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science Series
Soggetto topico Computer security
Data encryption (Computer science)
ISBN 9783031301223
9783031301216
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography -- Security Analysis of Improved EDHOC Protocol -- A Survey on Identity-based Blind Signature -- Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES -- Post-Quantum and UC-secure Oblivious Transfer from SPHF with Grey Zone -- A New Class of Trapdoor Verifiable Delay Functions -- Practical homomorphic evaluation of block-cipher-based hash functions with applications -- Towards a maturity model for crypto-agility assessment -- Machine Learning -- Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher -- Data-driven Evaluation of Intrusion Detectors : a Methodological Framework -- CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter -- Cybercrime and Privacy -- Where is The Python Interpreter? -- Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks -- Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms -- A Taxonomy and Gap-analysis in Digital Privacy Education -- Differentially Private Friends Recommendation -- Physical-layer Security -- Underwater Confidential Communications in JANUS -- Defense Models for Data Recovery in Industrial Control Systems -- SCADA Radio Blackbox Reverse Engineering -- Blockchain -- Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts -- Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts -- Money Transfer on Transaction Signature-based Ledger -- A Decentralized Mnemonic Backup System for Non-Custodial Cryptocurrency Wallets -- IoT and Security Protocols -- If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes -- Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords -- Towards Characterizing IoT Software Update Practices -- Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic -- Short Papers -- A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection -- Deep-Learning-Based Vulnerability Detection in Binary Executables -- Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis.
Record Nr. UNISA-996517751503316
Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Foundations and Practice of Security : 15th International Symposium, FPS 2022, Ottawa, on, Canada, December 12-14, 2022, Revised Selected Papers / / Guy-Vincent Jourdan [and four others], editors
Foundations and Practice of Security : 15th International Symposium, FPS 2022, Ottawa, on, Canada, December 12-14, 2022, Revised Selected Papers / / Guy-Vincent Jourdan [and four others], editors
Edizione [First edition.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023]
Descrizione fisica 1 online resource (478 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science Series
Soggetto topico Computer security
Data encryption (Computer science)
ISBN 9783031301223
9783031301216
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography -- Security Analysis of Improved EDHOC Protocol -- A Survey on Identity-based Blind Signature -- Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES -- Post-Quantum and UC-secure Oblivious Transfer from SPHF with Grey Zone -- A New Class of Trapdoor Verifiable Delay Functions -- Practical homomorphic evaluation of block-cipher-based hash functions with applications -- Towards a maturity model for crypto-agility assessment -- Machine Learning -- Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher -- Data-driven Evaluation of Intrusion Detectors : a Methodological Framework -- CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter -- Cybercrime and Privacy -- Where is The Python Interpreter? -- Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks -- Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms -- A Taxonomy and Gap-analysis in Digital Privacy Education -- Differentially Private Friends Recommendation -- Physical-layer Security -- Underwater Confidential Communications in JANUS -- Defense Models for Data Recovery in Industrial Control Systems -- SCADA Radio Blackbox Reverse Engineering -- Blockchain -- Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts -- Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts -- Money Transfer on Transaction Signature-based Ledger -- A Decentralized Mnemonic Backup System for Non-Custodial Cryptocurrency Wallets -- IoT and Security Protocols -- If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes -- Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords -- Towards Characterizing IoT Software Update Practices -- Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic -- Short Papers -- A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection -- Deep-Learning-Based Vulnerability Detection in Binary Executables -- Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis.
Record Nr. UNINA-9910686775803321
Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui