top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Security and Privacy : 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part II / / edited by Tianqing Zhu, Yannan Li
Information Security and Privacy : 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part II / / edited by Tianqing Zhu, Yannan Li
Autore Zhu Tianqing
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (464 pages)
Disciplina 005.8
Altri autori (Persone) LiYannan
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data and Information Security
ISBN 9789819750283
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Post Quantum Cryptography -- Improved Multimodal Private Signatures from Lattices -- Automatic Quantum Multi collision Distinguishers and Rebound Attacks with Triangulation Algorithm -- Lattice based more general anti leakage model and its application in decentralization -- An Efficient Hardware Implementation of Crystal Dilithium on FPGA -- Pushing the Limit of Vectorized Polynomial Multiplications for NTRU Prime -- Jumping for Berstein Yang Inversion -- DualRing PRF Post Quantum Linkable Ring Signatures from Legendre and Power Residue PRFs -- Faster verifications and smaller signatures Trade offs for Alteq using rejections -- Revisiting the Security of Fiat Shamir Signature Schemes under Superposition Attacks -- Improved Lattice Based Attack on Mersenne Low Hamming Ratio Search Problem -- Cryptanalysis -- New Strategy for Evaluating Differential Clustering Effect of uBlock -- Algebraic Cryptanalysis of the HADES Design Strategy: Application to Poseidon and Poseidon2 -- Revisiting Impossible Differential Cryptanalysis and Expanding the Application of MILP in Impossible Differential Attack -- Secure Protocols -- A Fault Tolerant Content Moderation Mechanism for Secure Messaging System -- Formal Verification of Challenge Flow in EMV 3D Secure -- Size Hiding Computation in the Honest But Curious Model -- Hidden Delta fairness A Novel Notion for Fair Secure Two Party Computation -- ProfistMAC A Protocol Finite State Machine Classifier via Graph Representation -- Subverting Cryptographic Protocols from A Fine Grained Perspective A Case Study on 2 Party ECDSA -- Application Security -- Deep Dive on Relationship between Personality and Password Creation -- Unveiling the Unseen Video Recognition Attacks on Social Software -- An Account Matching Method Based on Hyper Graph.
Record Nr. UNINA-9910874664303321
Zhu Tianqing  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Privacy : 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part III / / edited by Tianqing Zhu, Yannan Li
Information Security and Privacy : 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part III / / edited by Tianqing Zhu, Yannan Li
Autore Zhu Tianqing
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (469 pages)
Disciplina 005.8
Altri autori (Persone) LiYannan
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data and Information Security
ISBN 9789819751013
9789819751006
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Blockchain Technology -- Enhancing Permissioned Blockchains with Controlled Data Authorization -- FXChain a multi consortium blockchain with flexible privacy preserving strategies -- An Efficient Vulnerability Detection for Smart Contracts Using Gated Graph Neural Network -- Lightweight Instance Batch Schemes towards Prover efficient Decentralized Private Computation -- CrossAAD Cross-chain Abnormal Account Detection -- AegisDB Scalable Blockchain Database with Secure Decentralised Load Balancing -- Towards Scalable and Secure IoTs Transactions A New Bi directional Payment Channel without Third Party Monitoring -- Privacy Enhancing Technologies -- Understanding Privacy in Smart Speakers A Narrative Review -- RPPDFL A Robustness and Privacy Preserving Decentralized Federated Learning System -- FedSCD Federated learning with Semi centralization Discrepancy awareness and Dual model Collaboration -- Pirates Anonymous Group Calls Over Fully Untrusted Infrastructure -- SecuPath A Secure and Privacy Preserving Multiparty Path Planning Framework in UAV Applications -- System Security -- TSHMD Explainable Deep Learning for Time Series HPCs based IoT Malware Detection -- Security Research for Android Remote Assistance Apps -- SynBoost Robust Text Generation Model Via Beam Search and Synonym Driven Boosting -- CCED A Configuration Failure Prevention Method for Autonomous Driving Systems -- Action Driven UAV Fingerprint Verification with Perception Data -- AggNoteBot A Robust Botnet Building using Aggressive Cloud Notes -- Network Security -- FSAM Framework for Online CDN based Website Classification -- Towards Private Multi-Operator Network Slicing -- AI Security -- An Encrypted Traffic Classification Framework Based on Higher Interaction Graph Neural Network -- PassTSL Modeling Human Created Passwords through Two Stage Learning -- Detect Llama Finding Vulnerabilities in Smart Contracts using Large Language Models -- MMOOC A Multimodal Misinformation Dataset for Out of Context News Analysis.
Record Nr. UNINA-9910874675903321
Zhu Tianqing  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Privacy : 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part I / / edited by Tianqing Zhu, Yannan Li
Information Security and Privacy : 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part I / / edited by Tianqing Zhu, Yannan Li
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (507 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data and Information Security
ISBN 9789819750252
9789819750245
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Symmetric Key Cryptography -- The Offline Quantum Attack Against Modular Addition Variant of Even-Mansour Cipher -- Known Key Attack on GIFT 64 and GIFT 64 Based on Correlation Matrices -- On the Security Bounds for Block Ciphers without Whitening Key Addition against Integral Distinguishers -- On the Security Bounds for Block Ciphers without Whitening Key Addition against Integral Distinguishers -- Tight Multi user Security of Ascon and Its Large Key Extension -- Differential Distinguishing Attacks on SNOWV, SNOWVi and KCipher2 -- Efficient Search for Optimal Permutations of Refined TypeII Generalized Feistel Structures -- Homomorphic Encryption -- FFHEW High Precision Approximate Homomorphic Encryption with Batch Bootstrapping -- NTRU based FHE for Larger Key and Message Space -- An Efficient Integer-wise ReLU on TFHE -- HERatio Homomorphic Encryption of Rationals using Laurent polynomials -- TFHE Bootstrapping Faster Smaller and Time Space TradeOffs -- Approximate Methods for the Computation of Step Functions in Homomorphic Encryption -- Encryption and its Applications -- Key Cooperative Attribute-Based Encryption -- On the Feasibility of Identity based Encryption with Equality Test against Insider Attacks -- Non interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy -- On the Implication from Updatable Encryption to Public Key Cryptographic Primitives -- Continuous Version of Non malleable Codes from Authenticated Encryption -- Digital Signatures -- Pairing Free ID Based Signatures as Secure as Discrete Logarithm in AGM -- Threshold Ring Signatures with Accountability -- Threshold Signatures with Private Accountability via Secretly Designated Witnesses -- Cryptographic Primitives -- A Novel Window τ NAF on Koblitz Curves -- Parallel Algorithms on Hyperelliptic Pairings using Hyperelliptic Nets -- AlgSAT a SAT Method for Verification of Differential Trails from an Algebraic Perspective -- Hadamard product argument from Lagrange-based univariate polynomials.
Record Nr. UNINA-9910874679303321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Provable Security [[electronic resource] ] : 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings / / edited by Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li
Provable Security [[electronic resource] ] : 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings / / edited by Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 508 p. 37 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computers and civilization
Application software
Management information systems
Computer science
Algorithms
Cryptology
Systems and Data Security
Computers and Society
Computer Appl. in Administrative Data Processing
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
ISBN 3-319-68637-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure Cloud Storage and Computing -- Digital Signature and Authentication -- Authenticated Encryption and Key Exchange.- Security Models -- Lattice and Post-Quantum Cryptography -- Public Key Encryption and Signcryption -- Proxy Re-encryption and Functional Encryption -- Protocols.
Record Nr. UNISA-996465291403316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Provable Security : 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings / / edited by Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li
Provable Security : 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings / / edited by Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XIII, 508 p. 37 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computers and civilization
Application software
Management information systems
Computer science
Algorithms
Cryptology
Systems and Data Security
Computers and Society
Computer Appl. in Administrative Data Processing
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
ISBN 3-319-68637-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure Cloud Storage and Computing -- Digital Signature and Authentication -- Authenticated Encryption and Key Exchange.- Security Models -- Lattice and Post-Quantum Cryptography -- Public Key Encryption and Signcryption -- Proxy Re-encryption and Functional Encryption -- Protocols.
Record Nr. UNINA-9910484168403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui