Applied cryptography and network security : 19th international conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021 : proceedings / / Kazue Sako and Nils Ole Tippenhauer (editors) |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XIV, 482 p. 72 illus., 21 illus. in color.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer organization
Coding theory Computer security |
ISBN | 3-030-78372-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptographic Protocols -- Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles -- Analysis of Client-side Security for Long-term Time-stamping Services -- Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves -- Secure and Fair Protocols -- CECMLP: New Cipher-Based Evaluating Collaborative Multi-Layer Perceptron Scheme in Federated Learning -- Blind Polynomial Evaluation and Data Trading -- Coin-Based Multi-Party Fair Exchange -- Cryptocurrency and Smart Contracts -- P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange -- WOTS+ up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets -- Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems -- Digital Signatures -- Unlinkable and Invisible -Sanitizable Signatures -- Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More -- An Efficient Certificate-Based Signature Scheme in the Standard Model -- Embedded System Security -- SnakeGX: a sneaky attack against SGX Enclaves -- Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks -- Efficient FPGA Design of Exception-Free Generic Elliptic Curve Cryptosystems -- Lattice Cryptography -- Access Control Encryption from Group Encryption -- Password Protected Secret Sharing from Lattices -- Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts. |
Record Nr. | UNINA-9910485151703321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applied cryptography and network security : 19th international conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021 : proceedings / / Kazue Sako and Nils Ole Tippenhauer (editors) |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XIV, 482 p. 72 illus., 21 illus. in color.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer organization
Coding theory Computer security |
ISBN | 3-030-78372-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptographic Protocols -- Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles -- Analysis of Client-side Security for Long-term Time-stamping Services -- Towards Efficient and Strong Backward Private Searchable Encryption with Secure Enclaves -- Secure and Fair Protocols -- CECMLP: New Cipher-Based Evaluating Collaborative Multi-Layer Perceptron Scheme in Federated Learning -- Blind Polynomial Evaluation and Data Trading -- Coin-Based Multi-Party Fair Exchange -- Cryptocurrency and Smart Contracts -- P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange -- WOTS+ up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets -- Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems -- Digital Signatures -- Unlinkable and Invisible -Sanitizable Signatures -- Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More -- An Efficient Certificate-Based Signature Scheme in the Standard Model -- Embedded System Security -- SnakeGX: a sneaky attack against SGX Enclaves -- Telepathic Headache: Mitigating Cache Side-Channel Attacks on Convolutional Neural Networks -- Efficient FPGA Design of Exception-Free Generic Elliptic Curve Cryptosystems -- Lattice Cryptography -- Access Control Encryption from Group Encryption -- Password Protected Secret Sharing from Lattices -- Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts. |
Record Nr. | UNISA-996464387603316 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
. Part II : 19th international conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021 : proceedings Applied cryptography and network security. / / Kazue Sako, Nils Ole Tippenhauer (editors) |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XIV, 512 p. 125 illus., 77 illus. in color.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico | Data encryption (Computer science) |
ISBN | 3-030-78375-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Analysis of Applied Systems -- Breaking and Fixing Third-Party Payment Service for Mobile Apps -- DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing -- Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library -- Secure Computations -- Privacy-Preserving Data Aggregation with Probabilistic Range Validation -- LLVM-based Circuit Compilation for Practical Secure Computation -- An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings -- Cryptanalysis -- Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements -- Efficient Methods to Search for Best Differential Characteristics on SKINNY -- Towards Efficient LPN-Based Symmetric Encryption -- System Security -- A Differentially Private Hybrid Approach to Traffic Monitoring -- Proactive Detection of Phishing Kit Traffic -- Vestige: Identifying Binary Code Provenance for Vulnerability Detection -- SoK: Auditability and Accountability in Distributed Payment Systems -- Defending Web Servers Against Flash Crowd Attacks -- Cryptography and its Applications -- TurboIKOS: Improved Non-interactive Zero-Knowledge and Post-Quantum Signatures -- Cryptanalysis of the Binary Permuted Kernel Problem -- Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms -- Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols -- Improved Structured Encryption for SQL Databases via Hybrid Indexing. . |
Record Nr. | UNINA-9910484895403321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
. Part II : 19th international conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021 : proceedings Applied cryptography and network security. / / Kazue Sako, Nils Ole Tippenhauer (editors) |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XIV, 512 p. 125 illus., 77 illus. in color.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico | Data encryption (Computer science) |
ISBN | 3-030-78375-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Analysis of Applied Systems -- Breaking and Fixing Third-Party Payment Service for Mobile Apps -- DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing -- Threat for the Secure Remote Password Protocol and a Leak in Apple's Cryptographic Library -- Secure Computations -- Privacy-Preserving Data Aggregation with Probabilistic Range Validation -- LLVM-based Circuit Compilation for Practical Secure Computation -- An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings -- Cryptanalysis -- Experimental Review of the IKK Query Recovery Attack: Assumptions, Recovery Rate and Improvements -- Efficient Methods to Search for Best Differential Characteristics on SKINNY -- Towards Efficient LPN-Based Symmetric Encryption -- System Security -- A Differentially Private Hybrid Approach to Traffic Monitoring -- Proactive Detection of Phishing Kit Traffic -- Vestige: Identifying Binary Code Provenance for Vulnerability Detection -- SoK: Auditability and Accountability in Distributed Payment Systems -- Defending Web Servers Against Flash Crowd Attacks -- Cryptography and its Applications -- TurboIKOS: Improved Non-interactive Zero-Knowledge and Post-Quantum Signatures -- Cryptanalysis of the Binary Permuted Kernel Problem -- Security Comparisons and Performance Analyses of Post-Quantum Signature Algorithms -- Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols -- Improved Structured Encryption for SQL Databases via Hybrid Indexing. . |
Record Nr. | UNISA-996464436003316 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop / / Jiannong Cao [and three others] |
Autore | Cao Jiannong |
Pubbl/distr/stampa | New York NY : , : Association for Computing Machinery, , 2021 |
Descrizione fisica | 1 online resource (75 pages) |
Disciplina | 302.3 |
Soggetto topico | Cyberbullying |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910510453203321 |
Cao Jiannong | ||
New York NY : , : Association for Computing Machinery, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|