Advances in Information and Computer Security [[electronic resource] ] : First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings / / edited by Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XIII, 438 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Operating systems (Computers) Management information systems Computer science Computers and civilization Computer communication systems Algorithms Cryptology Operating Systems Management of Computing and Information Systems Computers and Society Computer Communication Networks Algorithm Analysis and Problem Complexity |
ISBN | 3-540-47700-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Signatures (1) -- ID-Based Ring Signature Scheme Secure in the Standard Model -- A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability -- Sound Computational Interpretation of Symbolic Hashes in the Standard Model -- Security Evaluation -- A Requirement Centric Framework for Information Security Evaluation -- A Model-Based Method for Security Configuration Verification -- Personal Computer Privacy: Analysis for Korean PC Users -- Signatures (2) -- Short Traceable Signatures Based on Bilinear Pairings -- Ring Signature with Designated Linkability -- Ad Hoc Group Signatures -- Rateless Codes for the Multicast Stream Authentication Problem -- Authentication -- Crossing Borders: Security and Privacy Issues of the European e-Passport -- A New Approach to Hide Policy for Automated Trust Negotiation -- Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing -- IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures -- Security for Multimedia -- A Study of Detection Method of Printed Image Alteration Using Digital Watermark -- Real-Time Watermark Embedding for High Resolution Video Watermarking -- Inhibiting Card Sharing Attacks -- Network Security -- A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction -- Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks -- Modeling of Network Intrusions Based on the Multiple Transition Probability -- Encryption and Key Exchange -- Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition -- Ciphertext-Auditable Public Key Encryption -- Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model -- Cryptanalysis and Implementation -- On the Effectiveness of TMTO and Exhaustive Search Attacks -- Low Power AES Hardware Architecture for Radio Frequency Identification -- The High-Speed Packet Cipher System Suitable for Small Sized Data -- Access Control -- A Tool for Managing Security Policies in Organisations -- Information Flow Query and Verification for Security Policy of Security-Enhanced Linux -- The Complexity of Discretionary Access Control -- Traceroute Based IP Channel for Sending Hidden Short Messages. |
Record Nr. | UNISA-996465899803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
BCC '19 : proceedings of the Third ACM Workshop on Blockchains, Cryptocurrencies, and Contracts : July 8, 2019, Auckland, New Zealand / / program chairs, Satya Lokam, Sushmita Ruj, Kouichi Sakurai |
Pubbl/distr/stampa | New York : , : Association for Computing Machinery, , 2019 |
Descrizione fisica | 1 online resource (26 pages) : illustrations |
Disciplina | 005.74 |
Collana | ACM conferences |
Soggetto topico |
Blockchains (Databases)
Cryptocurrencies Electronic funds transfers |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910412315703321 |
New York : , : Association for Computing Machinery, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Mathematics and Computing : ICMC 2018, Varanasi, India, January 9-11, Selected Contributions / / edited by Debdas Ghosh, Debasis Giri, Ram N. Mohapatra, Kouichi Sakurai, Ekrem Savas, Tanmoy Som |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (469 pages) |
Disciplina | 004.0151 |
Collana | Springer Proceedings in Mathematics & Statistics |
Soggetto topico |
Computer mathematics
Computer science—Mathematics Operations research Management science Computational Mathematics and Numerical Analysis Mathematical Applications in Computer Science Operations Research, Management Science Math Applications in Computer Science |
ISBN | 981-13-2095-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Constructions and Embeddings of Hamilton Decompositions of Families of Graphs -- Chapter 2. On Strong Pseudomonotone and Strong Quasimonotone Maps -- Chapter 3. A dynamic non-preemptive priority queueing model with two types of customers -- Chapter 4. Iθ -statistical convergence of weight g in topological groups -- Chapter 5. On the integral-balance solvability of the nonlinear Mullins model -- Chapter 6. Optimal Control of Rigidity Parameter of Elastic Inclusions in Composite Plate with a Crack -- Chapter 7. Convergence of generalized Mann type of iterates to common fixed point -- Chapter 8. Bohr's inequalities for harmonic mappings and beyond -- Chapter 9. Geometric degree reduction of Bezier curves -- Chapter 10. Numerical study on the influence of diffused soft layer in pH regulated polyelectrolyte coated nanopore -- Chapter 11. Quadruple Fixed Point Theorem For Partially Ordered Metric Space With Application To Integral Equations -- Chapter 12. Enhanced Prediction for Pieozophilic Protein by incor-porating Reduced Set of Amino Acids using Fuzzy-Rough Feature Selection technique followed by SMOTE -- Chapter 13. Effect of upper and lower moving wall on mixed convection of Cu-water nanofluid in an square enclosure with non-uniform heating -- Chapter 14. On Love wave frequency under the influence of linearly varying shear moduli, initial stress and density of orthotropic half space -- Chapter 15. The problem of oblique scattering by a thin vertical submerged plate in deep water-Revisited -- Chapter 16. A note on necessary condition for $L^p$ multipliers with power weights -- Chapter 17. On M/G(a,b)/1/N queue with batch size and queue length dependent service -- Chapter 18. A fuzzy random continuous ($Q,r,L$) inventory model involving controllable back-order rate and variable lead- time with imprecise chance constraint -- Chapter 19. Estimation of the location parameter of the general half-normal distribution -- Chapter 20. Existance of equilibrium solution of the coagulation-fragmentation equation with linear fragmentation kernel -- Chapter 21. Explicit Criteria for Stability of Two-Dimensional Fractional Nabla Difference Systems -- Chapter 22. Discrete Legendre collocation methods for Fredholm-Hammerstein integral equations with weakly singular kernel -- Chapter 23. Norm inequalities involving upper bounds for operators in Orlicz-Taylor sequence spaces -- Chapter 24. A Study on Fuzzy Triangle and Fuzzy Trigonometric Properties -- Chapter 25. An extension Asymptotically $\lambda$- Statistical Equivalent Sequences via Ideals -- Chapter 26. Fuzzy Goal Programing Approach for Resource Allocation in a NGO Operation -- Chapter 27. Stoichio Simulation of Facsp From Graph Transformations To Differential Equations -- Chapter 28. Fully Dynamic Group Signature Scheme with Member registration and Verifier-local Revocation -- Chapter 29. Second Hankel Determinant for a Class of Alpha-Close-to-Convex Functions -- Chapter 30. Fourier-based Function Secret Sharing with General Access Structure -- Chapter 31. Multiple Handed Hexagonal Tile Assembly Model on Interactive Systems -- Chapter 32. A uniformly convergent NIPG method for a singularly perturbed system of reaction-diffusion boundary-value problems -- Chapter 33. Efficient Numerical Methods for Linear Reaction-Diffusion System -- Chapter 34. Comparison of two methods based on Daubechies scale functions and Legendre multiwavelets for approximate solution of Cauchy type singular integral equation on R. |
Record Nr. | UNINA-9910300111303321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Mathematics and Computing : 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papers / / edited by Debdas Ghosh, Debasis Giri, Ram N. Mohapatra, Ekrem Savas, Kouichi Sakurai, L. P. Singh |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XIX, 325 p. 84 illus.) |
Disciplina | 004.0151 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer science—Mathematics
Data protection Mathematics of Computing Security |
ISBN |
981-13-0023-2
978-981-13-0023-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security and coding theory -- Computing -- Applied mathematics -- Pure mathematics. |
Record Nr. | UNINA-9910299312703321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Science of cyber security : 4th international conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, revised selected papers / / edited by Chunhua Su, Kouichi Sakurai, and Feng Liu |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (575 pages) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Computer security |
ISBN | 3-031-17551-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Blockchain and Applications -- ChainSCAN: A Blockchain-Based Supply Chain Alerting Framework for Food Safety -- 1 Introduction -- 2 Related Work -- 3 Threat Model -- 4 ChainSCAN Framework -- 4.1 Data Layer -- 4.2 BC Layer -- 4.3 APP Layer -- 5 ChainSCAN Prototype Evaluation -- 5.1 Prototype Implementation -- 5.2 Performance Evaluation -- 5.3 Security Analysis of ChainSCAN -- 6 Conclusion -- References -- BlockRAT: An Enhanced Remote Access Trojan Framework via Blockchain -- 1 Introduction -- 2 Background and Related Work -- 2.1 RAT, Botnets and C2 Channel -- 2.2 Blockchain Technology in RAT -- 2.3 Related Work -- 3 Our Approach -- 3.1 System Design -- 3.2 Attack Characteristics -- 4 Implementation Detail -- 4.1 Challenge and Solution 1: Blockchain Selection -- 4.2 Challenge and Solution 2: Obvious Traffic Characteristics -- 4.3 Challenge and Solution 3: Backdoor Persistence -- 5 Evaluation -- 5.1 Comparison with Common RATs -- 5.2 Effectiveness Evaluation -- 5.3 Comparison with Existing Blockchain-based RATs/botnets -- 5.4 Limitation and Discussion -- 6 Conclusions -- References -- Adapted PBFT Consensus Protocol for Sharded Blockchain -- 1 Introduction -- 2 Related Work -- 2.1 Sharded Blockchain -- 2.2 PBFT Algorithms -- 3 Background and Preliminaries -- 3.1 Blockchain Sharding -- 3.2 BFT Consensus Algorithms -- 4 Solution: A New Cross-shard BFT Consensus -- 4.1 Committee-wise Monitoring -- 4.2 How Does It Work? -- 4.3 Performance Guarantee Analysis -- 5 Performance Evaluation -- 5.1 Settings -- 5.2 Baseline Algorithms -- 5.3 Performance Discussion -- 6 Conclusion -- References -- A Practical Blockchain-Based Maintenance Record System for Better Aircraft Security -- 1 Introduction -- 2 Background and Related Work -- 2.1 Background on Blockchain -- 2.2 Blockchain in Aircraft Maintenance.
3 Our Proposed System - AirChain -- 3.1 Blockchain Platform Analysis and Selection -- 3.2 System Overview -- 3.3 Front-End Design and Implementation -- 4 Evaluation -- 4.1 Storage Growth -- 4.2 Processing Time -- 5 Limitations and Discussion -- 5.1 Scalability: Adding Smart Contracts -- 5.2 Security -- 6 Conclusion -- References -- Redactable Blockchain with Fine-Grained Autonomy and Transaction Rollback -- 1 Introduction -- 2 Preliminaries -- 2.1 Notation -- 2.2 Gap Diffie-Hellman (GDH) Group -- 2.3 Double Trapdoor Chameleon Hash Function -- 2.4 The Chameleon Hashing Without Key Exposure -- 2.5 A Discrete Log-Based Double Trapdoor Commitment Scheme -- 2.6 Blocks and Chain -- 2.7 Publicly Verifiable Secret Sharing (PVSS) -- 3 Double Trapdoor Key-exposure Free Chameleon Hash Function -- 3.1 Our Double Trapdoor Key-Exposure Free Chameleon Hash Function -- 4 Blockchain Redacting Protocol -- 4.1 Redactable Blockchain System -- 4.2 Technique Overview -- 4.3 Block Information Revision -- 4.4 Transaction Rollback -- 5 Conclusion -- References -- Cryptography and Applications -- Pitch in: A Secure Extension Signature Based on SM9 -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contribution -- 1.3 Organization -- 2 Preliminaries -- 2.1 Definitions -- 2.2 The SM9-IBS -- 2.3 q-Strong Diffie-Hellman Problem -- 3 Our Scheme -- 3.1 Notation -- 3.2 Construction -- 4 Analysis -- 4.1 Correctness -- 4.2 Security Results -- 5 Efficiency Discussions -- 6 Conclusion -- References -- Verifiable DOPE from Somewhat Homomorphic Encryption, and the Extension to DOT -- 1 Introduction -- 1.1 Background -- 1.2 Our Contribution -- 2 Preliminaries -- 2.1 Model -- 2.2 Shamir's Secret Sharing -- 2.3 The Paillier Cryptosystem -- 2.4 Message Authentication Code -- 2.5 Security -- 3 Our Protocol -- 3.1 Setup Phase -- 3.2 Computation Phase -- 4 Security Evaluation -- 5 Extension to DOT. 6 Conclusion -- References -- Scalable M+1st-Price Auction with Infinite Bidding Price -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 4 Our Protocol -- 4.1 Auction Protocol -- 4.2 Features and Security -- 5 Implementation and Optimization -- 6 Comparison -- 7 Conclusion -- References -- The Shared Memory Based Cryptographic Card Virtualization -- 1 Introduction -- 2 Related Work -- 2.1 Software Virtualization -- 2.2 Hardware-Assisted Virtualization -- 3 Framework -- 4 Implementation -- 4.1 Shared Memory -- 4.2 Frontend Service -- 4.3 Backend Service -- 5 Performance Evaluation -- 5.1 Experiment Environment -- 5.2 Data Transfer Performance Test -- 5.3 Encryption Algorithm Performance Test -- 5.4 Performance Test After Optimization -- 6 Summary and Outlook -- References -- Network Security -- Feature Transfer Based Network Anomaly Detection -- 1 Introduction -- 1.1 Motivation -- 1.2 Related Work -- 2 Preliminaries -- 2.1 Transformer -- 2.2 Experimental Data Set -- 2.3 Evaluation Indicators -- 3 Feature Transfer Based Anomaly Detection Model -- 3.1 Framework -- 3.2 Data Pre-processing -- 3.3 Model Training -- 4 Experimental Results and Analysis -- 4.1 Identification of Various Types of Known Attacks -- 4.2 Identification of Various Types of Unknown Attacks -- 5 Conclusion -- References -- Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN -- 1 Introduction -- 2 Related Work -- 3 Motivation and Our Intuition -- 4 Network Mode and Hybrid Routing for Efficient Fine-grained Management -- 4.1 Network Model -- 4.2 Heterogeneous Rule Installment for Case A -- 4.3 Heterogeneous Rule Installment for Case B -- 4.4 Heterogeneous Rule Installment for Case C -- 5 Performance Evaluation -- 5.1 Testbed Evaluation -- 5.2 Simulation Evaluation -- 6 Conclusion -- References. AtNet: A Novel Anti-tracking Network with Multi-Party Judgement Capability Based on Cross-Domain Small-World Topology -- 1 Introduction -- 2 Related Work -- 3 Designing AtNet -- 3.1 The Overview of AtNet -- 3.2 The Construction of AtNet -- 3.3 The Maintenance of AtNet -- 3.4 Multi-party Judgement Mechanism on AtNet -- 4 Experiment and Evaluation -- 4.1 Evaluation of Network Robustness -- 4.2 Evaluation of Maintenance Effect -- 4.3 Evaluation of Multi-party Judgement Capability -- 5 Conclusion and Future Work -- References -- A Two-Stage Method for Fine-Grained DNS Covert Tunnel Behavior Detection -- 1 Introduction -- 2 Background and Related Work -- 2.1 DNS Covert Tunnel -- 2.2 Related Work -- 3 Method -- 3.1 DNS Covert Tunnel Behavior Detection Framework -- 3.2 DNS Covert Tunnel Traffic Detection -- 3.3 DNS Covert Tunnel Behavior Detection -- 4 Evaluation -- 4.1 Dataset -- 4.2 Performance Metrics -- 4.3 DNS Covert Tunnel Traffic Detection Evaluation -- 4.4 DNS Covert Tunnel Behavior Detection Evaluation -- 5 Conclusion -- References -- Analysis and Detection Against Overlapping Phenomenon of Behavioral Attribute in Network Attacks -- 1 Introduction -- 2 Background and Related Work -- 2.1 UNSW-NB15 -- 2.2 CIC-AndMal-2020 -- 3 Analysis of Overlapping Phenomenon -- 3.1 Overview -- 3.2 Definition of Overlapping Phenomenon -- 3.3 Case Analysis of Overlapping Phenomenon -- 3.4 Cause Analysis of Overlapping Phenomenon -- 3.5 Experimental Statistics of Overlapping Phenomenon -- 3.6 Data Re-labeling -- 4 Multi-label Attack Detection and Evaluation -- 4.1 Definition of Multi-label Attack Detection Problem -- 4.2 Multi-label Detection Methods -- 4.3 Experiment and Evaluation -- 5 Discussion -- 5.1 Performance of Multi-label Detection Methods -- 5.2 Application Scenarios for Overlapping Phenomenon Analysis -- 6 Conclusion -- References. Integration of Cybersecurity Related Development Processes by Using a Quantification Method -- 1 Introduction -- 1.1 Measurement of Cybersecurity Relevant Development Processes According to ISO 21434 -- 1.2 Classification of the Security Relevant Processes in the V-Model -- 2 Quantification of the Cybersecurity Relevant Processes -- 2.1 Determination of the Supporting Processes for the Evaluation of the Preconditions -- 2.2 Preconditional Coefficient (PCC) for the Quantification of the Maturity -- 3 Application Example on an Automotive Project for an ADAS System -- 3.1 Derivation of a Measure Based on the Result of the Preconditional Coefficient -- 4 Summary and Discussion -- References -- Cyber-Physical System -- ZoomPass: A Zoom-Based Android Unlock Scheme on Smart Devices -- 1 Introduction -- 2 Related Work -- 2.1 Authentication Based on Graphical Password -- 2.2 Touch Behavioral Authentication -- 3 ZoomPass Design -- 4 User Study -- 5 Discussion -- 6 Conclusion -- References -- Metasploit for Cyber-Physical Security Testing with Real-Time Constraints -- 1 Introduction -- 2 Related Work -- 3 Background: Cyber-Attack as a Real-Time Process -- 4 Methodology -- 4.1 Program Configuration -- 4.2 Experimental Setup -- 4.3 Experiments -- 5 Results and Discussion -- 6 Case Study -- 7 Conclusion -- References -- Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems -- 1 Introduction -- 2 Consecutive Touch Actions Based Passive Authentication -- 2.1 User Identity Characterization Based on Time-Varying Touch Action Sequence -- 2.2 User Identity Characterization Based on Cumulative Touch Screen Action Trajectories -- 2.3 User Authentication Based on both HMM and PatternNet -- 3 Experiment and Analysis -- 3.1 Influence of the Number of Touch Screen Actions -- 3.2 Performance of Resisting Impersonation Attacks -- 4 Conclusion. References. |
Record Nr. | UNISA-996490357303316 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Science of cyber security : 4th international conference, SciSec 2022, Matsue, Japan, August 10-12, 2022, revised selected papers / / edited by Chunhua Su, Kouichi Sakurai, and Feng Liu |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (575 pages) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Computer security |
ISBN | 3-031-17551-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Blockchain and Applications -- ChainSCAN: A Blockchain-Based Supply Chain Alerting Framework for Food Safety -- 1 Introduction -- 2 Related Work -- 3 Threat Model -- 4 ChainSCAN Framework -- 4.1 Data Layer -- 4.2 BC Layer -- 4.3 APP Layer -- 5 ChainSCAN Prototype Evaluation -- 5.1 Prototype Implementation -- 5.2 Performance Evaluation -- 5.3 Security Analysis of ChainSCAN -- 6 Conclusion -- References -- BlockRAT: An Enhanced Remote Access Trojan Framework via Blockchain -- 1 Introduction -- 2 Background and Related Work -- 2.1 RAT, Botnets and C2 Channel -- 2.2 Blockchain Technology in RAT -- 2.3 Related Work -- 3 Our Approach -- 3.1 System Design -- 3.2 Attack Characteristics -- 4 Implementation Detail -- 4.1 Challenge and Solution 1: Blockchain Selection -- 4.2 Challenge and Solution 2: Obvious Traffic Characteristics -- 4.3 Challenge and Solution 3: Backdoor Persistence -- 5 Evaluation -- 5.1 Comparison with Common RATs -- 5.2 Effectiveness Evaluation -- 5.3 Comparison with Existing Blockchain-based RATs/botnets -- 5.4 Limitation and Discussion -- 6 Conclusions -- References -- Adapted PBFT Consensus Protocol for Sharded Blockchain -- 1 Introduction -- 2 Related Work -- 2.1 Sharded Blockchain -- 2.2 PBFT Algorithms -- 3 Background and Preliminaries -- 3.1 Blockchain Sharding -- 3.2 BFT Consensus Algorithms -- 4 Solution: A New Cross-shard BFT Consensus -- 4.1 Committee-wise Monitoring -- 4.2 How Does It Work? -- 4.3 Performance Guarantee Analysis -- 5 Performance Evaluation -- 5.1 Settings -- 5.2 Baseline Algorithms -- 5.3 Performance Discussion -- 6 Conclusion -- References -- A Practical Blockchain-Based Maintenance Record System for Better Aircraft Security -- 1 Introduction -- 2 Background and Related Work -- 2.1 Background on Blockchain -- 2.2 Blockchain in Aircraft Maintenance.
3 Our Proposed System - AirChain -- 3.1 Blockchain Platform Analysis and Selection -- 3.2 System Overview -- 3.3 Front-End Design and Implementation -- 4 Evaluation -- 4.1 Storage Growth -- 4.2 Processing Time -- 5 Limitations and Discussion -- 5.1 Scalability: Adding Smart Contracts -- 5.2 Security -- 6 Conclusion -- References -- Redactable Blockchain with Fine-Grained Autonomy and Transaction Rollback -- 1 Introduction -- 2 Preliminaries -- 2.1 Notation -- 2.2 Gap Diffie-Hellman (GDH) Group -- 2.3 Double Trapdoor Chameleon Hash Function -- 2.4 The Chameleon Hashing Without Key Exposure -- 2.5 A Discrete Log-Based Double Trapdoor Commitment Scheme -- 2.6 Blocks and Chain -- 2.7 Publicly Verifiable Secret Sharing (PVSS) -- 3 Double Trapdoor Key-exposure Free Chameleon Hash Function -- 3.1 Our Double Trapdoor Key-Exposure Free Chameleon Hash Function -- 4 Blockchain Redacting Protocol -- 4.1 Redactable Blockchain System -- 4.2 Technique Overview -- 4.3 Block Information Revision -- 4.4 Transaction Rollback -- 5 Conclusion -- References -- Cryptography and Applications -- Pitch in: A Secure Extension Signature Based on SM9 -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contribution -- 1.3 Organization -- 2 Preliminaries -- 2.1 Definitions -- 2.2 The SM9-IBS -- 2.3 q-Strong Diffie-Hellman Problem -- 3 Our Scheme -- 3.1 Notation -- 3.2 Construction -- 4 Analysis -- 4.1 Correctness -- 4.2 Security Results -- 5 Efficiency Discussions -- 6 Conclusion -- References -- Verifiable DOPE from Somewhat Homomorphic Encryption, and the Extension to DOT -- 1 Introduction -- 1.1 Background -- 1.2 Our Contribution -- 2 Preliminaries -- 2.1 Model -- 2.2 Shamir's Secret Sharing -- 2.3 The Paillier Cryptosystem -- 2.4 Message Authentication Code -- 2.5 Security -- 3 Our Protocol -- 3.1 Setup Phase -- 3.2 Computation Phase -- 4 Security Evaluation -- 5 Extension to DOT. 6 Conclusion -- References -- Scalable M+1st-Price Auction with Infinite Bidding Price -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 4 Our Protocol -- 4.1 Auction Protocol -- 4.2 Features and Security -- 5 Implementation and Optimization -- 6 Comparison -- 7 Conclusion -- References -- The Shared Memory Based Cryptographic Card Virtualization -- 1 Introduction -- 2 Related Work -- 2.1 Software Virtualization -- 2.2 Hardware-Assisted Virtualization -- 3 Framework -- 4 Implementation -- 4.1 Shared Memory -- 4.2 Frontend Service -- 4.3 Backend Service -- 5 Performance Evaluation -- 5.1 Experiment Environment -- 5.2 Data Transfer Performance Test -- 5.3 Encryption Algorithm Performance Test -- 5.4 Performance Test After Optimization -- 6 Summary and Outlook -- References -- Network Security -- Feature Transfer Based Network Anomaly Detection -- 1 Introduction -- 1.1 Motivation -- 1.2 Related Work -- 2 Preliminaries -- 2.1 Transformer -- 2.2 Experimental Data Set -- 2.3 Evaluation Indicators -- 3 Feature Transfer Based Anomaly Detection Model -- 3.1 Framework -- 3.2 Data Pre-processing -- 3.3 Model Training -- 4 Experimental Results and Analysis -- 4.1 Identification of Various Types of Known Attacks -- 4.2 Identification of Various Types of Unknown Attacks -- 5 Conclusion -- References -- Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN -- 1 Introduction -- 2 Related Work -- 3 Motivation and Our Intuition -- 4 Network Mode and Hybrid Routing for Efficient Fine-grained Management -- 4.1 Network Model -- 4.2 Heterogeneous Rule Installment for Case A -- 4.3 Heterogeneous Rule Installment for Case B -- 4.4 Heterogeneous Rule Installment for Case C -- 5 Performance Evaluation -- 5.1 Testbed Evaluation -- 5.2 Simulation Evaluation -- 6 Conclusion -- References. AtNet: A Novel Anti-tracking Network with Multi-Party Judgement Capability Based on Cross-Domain Small-World Topology -- 1 Introduction -- 2 Related Work -- 3 Designing AtNet -- 3.1 The Overview of AtNet -- 3.2 The Construction of AtNet -- 3.3 The Maintenance of AtNet -- 3.4 Multi-party Judgement Mechanism on AtNet -- 4 Experiment and Evaluation -- 4.1 Evaluation of Network Robustness -- 4.2 Evaluation of Maintenance Effect -- 4.3 Evaluation of Multi-party Judgement Capability -- 5 Conclusion and Future Work -- References -- A Two-Stage Method for Fine-Grained DNS Covert Tunnel Behavior Detection -- 1 Introduction -- 2 Background and Related Work -- 2.1 DNS Covert Tunnel -- 2.2 Related Work -- 3 Method -- 3.1 DNS Covert Tunnel Behavior Detection Framework -- 3.2 DNS Covert Tunnel Traffic Detection -- 3.3 DNS Covert Tunnel Behavior Detection -- 4 Evaluation -- 4.1 Dataset -- 4.2 Performance Metrics -- 4.3 DNS Covert Tunnel Traffic Detection Evaluation -- 4.4 DNS Covert Tunnel Behavior Detection Evaluation -- 5 Conclusion -- References -- Analysis and Detection Against Overlapping Phenomenon of Behavioral Attribute in Network Attacks -- 1 Introduction -- 2 Background and Related Work -- 2.1 UNSW-NB15 -- 2.2 CIC-AndMal-2020 -- 3 Analysis of Overlapping Phenomenon -- 3.1 Overview -- 3.2 Definition of Overlapping Phenomenon -- 3.3 Case Analysis of Overlapping Phenomenon -- 3.4 Cause Analysis of Overlapping Phenomenon -- 3.5 Experimental Statistics of Overlapping Phenomenon -- 3.6 Data Re-labeling -- 4 Multi-label Attack Detection and Evaluation -- 4.1 Definition of Multi-label Attack Detection Problem -- 4.2 Multi-label Detection Methods -- 4.3 Experiment and Evaluation -- 5 Discussion -- 5.1 Performance of Multi-label Detection Methods -- 5.2 Application Scenarios for Overlapping Phenomenon Analysis -- 6 Conclusion -- References. Integration of Cybersecurity Related Development Processes by Using a Quantification Method -- 1 Introduction -- 1.1 Measurement of Cybersecurity Relevant Development Processes According to ISO 21434 -- 1.2 Classification of the Security Relevant Processes in the V-Model -- 2 Quantification of the Cybersecurity Relevant Processes -- 2.1 Determination of the Supporting Processes for the Evaluation of the Preconditions -- 2.2 Preconditional Coefficient (PCC) for the Quantification of the Maturity -- 3 Application Example on an Automotive Project for an ADAS System -- 3.1 Derivation of a Measure Based on the Result of the Preconditional Coefficient -- 4 Summary and Discussion -- References -- Cyber-Physical System -- ZoomPass: A Zoom-Based Android Unlock Scheme on Smart Devices -- 1 Introduction -- 2 Related Work -- 2.1 Authentication Based on Graphical Password -- 2.2 Touch Behavioral Authentication -- 3 ZoomPass Design -- 4 User Study -- 5 Discussion -- 6 Conclusion -- References -- Metasploit for Cyber-Physical Security Testing with Real-Time Constraints -- 1 Introduction -- 2 Related Work -- 3 Background: Cyber-Attack as a Real-Time Process -- 4 Methodology -- 4.1 Program Configuration -- 4.2 Experimental Setup -- 4.3 Experiments -- 5 Results and Discussion -- 6 Case Study -- 7 Conclusion -- References -- Passive User Authentication Utilizing Consecutive Touch Action Features for IIoT Systems -- 1 Introduction -- 2 Consecutive Touch Actions Based Passive Authentication -- 2.1 User Identity Characterization Based on Time-Varying Touch Action Sequence -- 2.2 User Identity Characterization Based on Cumulative Touch Screen Action Trajectories -- 2.3 User Authentication Based on both HMM and PatternNet -- 3 Experiment and Analysis -- 3.1 Influence of the Number of Touch Screen Actions -- 3.2 Performance of Resisting Impersonation Attacks -- 4 Conclusion. References. |
Record Nr. | UNINA-9910616396003321 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Science of cyber security - SciSec 2022 workshops : AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 10-12, 2022, revised selected papers / / Chunhua Su and Kouichi Sakurai, editors |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore Pte Ltd., , [2022] |
Descrizione fisica | 1 online resource (232 pages) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Data encryption (Computer science) |
ISBN | 981-19-7769-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996503561803316 |
Singapore : , : Springer Nature Singapore Pte Ltd., , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Science of cyber security - SciSec 2022 workshops : AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 10-12, 2022, revised selected papers / / Chunhua Su and Kouichi Sakurai, editors |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore Pte Ltd., , [2022] |
Descrizione fisica | 1 online resource (232 pages) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Data encryption (Computer science) |
ISBN | 981-19-7769-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910637725303321 |
Singapore : , : Springer Nature Singapore Pte Ltd., , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|