Information Security and Privacy : 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part II / / edited by Tianqing Zhu, Yannan Li |
Autore | Zhu Tianqing |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (464 pages) |
Disciplina | 005.8 |
Altri autori (Persone) | LiYannan |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Data and Information Security |
ISBN | 9789819750283 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Post Quantum Cryptography -- Improved Multimodal Private Signatures from Lattices -- Automatic Quantum Multi collision Distinguishers and Rebound Attacks with Triangulation Algorithm -- Lattice based more general anti leakage model and its application in decentralization -- An Efficient Hardware Implementation of Crystal Dilithium on FPGA -- Pushing the Limit of Vectorized Polynomial Multiplications for NTRU Prime -- Jumping for Berstein Yang Inversion -- DualRing PRF Post Quantum Linkable Ring Signatures from Legendre and Power Residue PRFs -- Faster verifications and smaller signatures Trade offs for Alteq using rejections -- Revisiting the Security of Fiat Shamir Signature Schemes under Superposition Attacks -- Improved Lattice Based Attack on Mersenne Low Hamming Ratio Search Problem -- Cryptanalysis -- New Strategy for Evaluating Differential Clustering Effect of uBlock -- Algebraic Cryptanalysis of the HADES Design Strategy: Application to Poseidon and Poseidon2 -- Revisiting Impossible Differential Cryptanalysis and Expanding the Application of MILP in Impossible Differential Attack -- Secure Protocols -- A Fault Tolerant Content Moderation Mechanism for Secure Messaging System -- Formal Verification of Challenge Flow in EMV 3D Secure -- Size Hiding Computation in the Honest But Curious Model -- Hidden Delta fairness A Novel Notion for Fair Secure Two Party Computation -- ProfistMAC A Protocol Finite State Machine Classifier via Graph Representation -- Subverting Cryptographic Protocols from A Fine Grained Perspective A Case Study on 2 Party ECDSA -- Application Security -- Deep Dive on Relationship between Personality and Password Creation -- Unveiling the Unseen Video Recognition Attacks on Social Software -- An Account Matching Method Based on Hyper Graph. |
Record Nr. | UNINA-9910874664303321 |
Zhu Tianqing | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security and Privacy : 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part III / / edited by Tianqing Zhu, Yannan Li |
Autore | Zhu Tianqing |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (469 pages) |
Disciplina | 005.8 |
Altri autori (Persone) | LiYannan |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Data and Information Security |
ISBN |
9789819751013
9789819751006 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Blockchain Technology -- Enhancing Permissioned Blockchains with Controlled Data Authorization -- FXChain a multi consortium blockchain with flexible privacy preserving strategies -- An Efficient Vulnerability Detection for Smart Contracts Using Gated Graph Neural Network -- Lightweight Instance Batch Schemes towards Prover efficient Decentralized Private Computation -- CrossAAD Cross-chain Abnormal Account Detection -- AegisDB Scalable Blockchain Database with Secure Decentralised Load Balancing -- Towards Scalable and Secure IoTs Transactions A New Bi directional Payment Channel without Third Party Monitoring -- Privacy Enhancing Technologies -- Understanding Privacy in Smart Speakers A Narrative Review -- RPPDFL A Robustness and Privacy Preserving Decentralized Federated Learning System -- FedSCD Federated learning with Semi centralization Discrepancy awareness and Dual model Collaboration -- Pirates Anonymous Group Calls Over Fully Untrusted Infrastructure -- SecuPath A Secure and Privacy Preserving Multiparty Path Planning Framework in UAV Applications -- System Security -- TSHMD Explainable Deep Learning for Time Series HPCs based IoT Malware Detection -- Security Research for Android Remote Assistance Apps -- SynBoost Robust Text Generation Model Via Beam Search and Synonym Driven Boosting -- CCED A Configuration Failure Prevention Method for Autonomous Driving Systems -- Action Driven UAV Fingerprint Verification with Perception Data -- AggNoteBot A Robust Botnet Building using Aggressive Cloud Notes -- Network Security -- FSAM Framework for Online CDN based Website Classification -- Towards Private Multi-Operator Network Slicing -- AI Security -- An Encrypted Traffic Classification Framework Based on Higher Interaction Graph Neural Network -- PassTSL Modeling Human Created Passwords through Two Stage Learning -- Detect Llama Finding Vulnerabilities in Smart Contracts using Large Language Models -- MMOOC A Multimodal Misinformation Dataset for Out of Context News Analysis. |
Record Nr. | UNINA-9910874675903321 |
Zhu Tianqing | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security and Privacy : 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part I / / edited by Tianqing Zhu, Yannan Li |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (507 pages) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data protection
Data and Information Security |
ISBN |
9789819750252
9789819750245 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Symmetric Key Cryptography -- The Offline Quantum Attack Against Modular Addition Variant of Even-Mansour Cipher -- Known Key Attack on GIFT 64 and GIFT 64 Based on Correlation Matrices -- On the Security Bounds for Block Ciphers without Whitening Key Addition against Integral Distinguishers -- On the Security Bounds for Block Ciphers without Whitening Key Addition against Integral Distinguishers -- Tight Multi user Security of Ascon and Its Large Key Extension -- Differential Distinguishing Attacks on SNOWV, SNOWVi and KCipher2 -- Efficient Search for Optimal Permutations of Refined TypeII Generalized Feistel Structures -- Homomorphic Encryption -- FFHEW High Precision Approximate Homomorphic Encryption with Batch Bootstrapping -- NTRU based FHE for Larger Key and Message Space -- An Efficient Integer-wise ReLU on TFHE -- HERatio Homomorphic Encryption of Rationals using Laurent polynomials -- TFHE Bootstrapping Faster Smaller and Time Space TradeOffs -- Approximate Methods for the Computation of Step Functions in Homomorphic Encryption -- Encryption and its Applications -- Key Cooperative Attribute-Based Encryption -- On the Feasibility of Identity based Encryption with Equality Test against Insider Attacks -- Non interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy -- On the Implication from Updatable Encryption to Public Key Cryptographic Primitives -- Continuous Version of Non malleable Codes from Authenticated Encryption -- Digital Signatures -- Pairing Free ID Based Signatures as Secure as Discrete Logarithm in AGM -- Threshold Ring Signatures with Accountability -- Threshold Signatures with Private Accountability via Secretly Designated Witnesses -- Cryptographic Primitives -- A Novel Window τ NAF on Koblitz Curves -- Parallel Algorithms on Hyperelliptic Pairings using Hyperelliptic Nets -- AlgSAT a SAT Method for Verification of Differential Trails from an Algebraic Perspective -- Hadamard product argument from Lagrange-based univariate polynomials. |
Record Nr. | UNINA-9910874679303321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Provable Security [[electronic resource] ] : 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings / / edited by Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIII, 508 p. 37 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computers and civilization Application software Management information systems Computer science Algorithms Cryptology Systems and Data Security Computers and Society Computer Appl. in Administrative Data Processing Management of Computing and Information Systems Algorithm Analysis and Problem Complexity |
ISBN | 3-319-68637-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Secure Cloud Storage and Computing -- Digital Signature and Authentication -- Authenticated Encryption and Key Exchange.- Security Models -- Lattice and Post-Quantum Cryptography -- Public Key Encryption and Signcryption -- Proxy Re-encryption and Functional Encryption -- Protocols. |
Record Nr. | UNISA-996465291403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Provable Security : 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings / / edited by Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIII, 508 p. 37 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computers and civilization Application software Management information systems Computer science Algorithms Cryptology Systems and Data Security Computers and Society Computer Appl. in Administrative Data Processing Management of Computing and Information Systems Algorithm Analysis and Problem Complexity |
ISBN | 3-319-68637-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Secure Cloud Storage and Computing -- Digital Signature and Authentication -- Authenticated Encryption and Key Exchange.- Security Models -- Lattice and Post-Quantum Cryptography -- Public Key Encryption and Signcryption -- Proxy Re-encryption and Functional Encryption -- Protocols. |
Record Nr. | UNINA-9910484168403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|