top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2021 International conference on applications and techniques in cyber intelligence : applications and techniques in cyber intelligence (ATCI 2021) / / edited by Jemal Abawajy [and three others]
2021 International conference on applications and techniques in cyber intelligence : applications and techniques in cyber intelligence (ATCI 2021) / / edited by Jemal Abawajy [and three others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (1015 pages)
Disciplina 005.8
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Engineering - Data processing
Cibernètica
Seguretat informàtica
Protecció de dades
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-030-79200-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- Organization -- General Chairs -- Online Conference Organizing Chairs -- Program Chairs -- Publication Chairs -- Publicity Chairs -- Website and Local Service Chairs -- Program Committee Members -- Welcome Message -- Conference Program at a Glance -- ATCI 2021 Keynotes -- Oral Presentation Instruction -- Registration -- Contents -- Cyber Intelligence for Business and Management Innovations -- Prediction of Total Investment in Fixed Assets Based on the SARIMA Model and X12ARIMA Seasonal Adjustment Method -- 1 Introduction -- 2 Model Establishment and Indicator Description -- 2.1 Data Sources and Related Instruction -- 2.2 Judging Data Seasonality -- 2.3 Model Establishment -- 3 Model Prediction -- 3.1 Analysis and Prediction Using SARIMA Model -- 3.2 X12ARIMA Seasonal Adjustment Method Using Addition -- 3.3 X12ARIMA Seasonal Adjustment Method Using Multiplication -- 3.4 Forecast Results and Comparison of X12ARIMA Seasonal Adjustment Method Using Addition and Multiplication -- 3.5 Automatic Prediction of X12ARIMA Seasonal Adjustment Method Based on R Language -- 4 Conclusion -- References -- Analysis of the Impact of Green Credit on the Operating Efficiency of Listed Commercial Banks Based on Python -- 1 Introduction -- 2 Data and Model -- 2.1 Variable Selection -- 2.2 Data Source -- 2.3 Descriptive Statistical Analysis -- 2.4 Model Setting and Selection -- 2.5 Model Selection -- 3 Conclusions -- References -- The Influence of Computer Network Technology on Trade Development -- 1 Changes of Trade Market Environment under the Background of Internet Development -- 2 Application of Internet Technology in Trade Activities -- 3 The Impact of Internet on the Development of Trade -- 4 Problems in the Application of Internet in Trade -- 5 Improve the Effectiveness of Internet Application in Trade Process -- 6 Conclusion -- References.
The Application of Knowledge Map and the Construction of Enterprise Knowledge Map -- 1 Introduction -- 2 Knowledge Graph and Structure of the Enterprise Information System -- 3 Application of Knowledge Graph -- 3.1 Problem Solving -- 3.2 Network Security -- 3.3 Intelligent Application -- 4 Construction of Knowledge Map -- 4.1 Knowledge Extraction -- 4.2 Knowledge Integration -- 4.3 Developing Knowledge Map -- 5 Conclusion -- References -- Interaction Mechanism of Regional Tourism Industry and Information Industry -- 1 Introduction -- 2 Research Methods -- 3 Evaluation System -- 4 Interaction Mechanism -- 4.1 Stationarity Test -- 4.2 Selection of Lag Order -- 4.3 PVR Model Estimation -- 4.4 The Dynamic Response of Tourism Industry and Information Industry -- 4.5 Analysis of Variance -- 5 Conclusion -- References -- Service Quality Evaluation of Office Property Management Based on SERVQUAL Model -- 1 Introduction -- 2 Related theories of Office Property Management Service Quality -- 3 Establishment of Service Quality Index System -- 3.1 Index Selection -- 3.2 Weight Determination -- 3.3 The Square Root Method is Used to Calculate the Eigenvector and Weight -- 3.4 Evaluate the Service Quality of Office Property Management -- 4 Service Quality Satisfaction and Importance Evaluation -- 5 Conclusions -- References -- Characteristics and Trends of Tourism Informatization Research - Based on Citespace Knowledge Map Analysis -- 1 Introduction -- 2 Research Methods and Data Sources -- 3 Statistics and Analysis -- 3.1 Distribution of Domestic Tourism Information Research -- 3.2 Distribution of Domestic Tourism Information Research Journals -- 3.3 An Analysis of the Frontier Hot Spots of Domestic Tourism Informatization Research -- 3.4 Trajectory and Trend Analysis of Domestic Tourism Informatization Research -- 4 Discussion and Conclusion -- References.
Policy Guarantee for the Development of FinTech Under the Flow of Information Technology in Guangdong-Hong Kong-Macao Greater Bay Area -- 1 Introduction -- 2 Challenges Facing FinTech Development in the Greater Bay Area -- 2.1 The Flow of FinTech Talents is Not Smooth -- 2.2 Cross-Border Logistics Transportation is Not Smooth -- 2.3 The Cross-Border Use of Financial Funds is Not Smooth -- 2.4 The Communication of Information and Data is Not Smooth -- 3 Policy Guarantee for the Development of FinTech in the Greater Bay Area -- 3.1 Administrative Management and Policy Guarantee -- 3.2 Talent Guarantee for the Development of Dawan FinTech -- 3.3 Healthy Competition Guarantee for the Development of Insurance Technology in the Greater Bay Area -- 3.4 Platform Guarantee for FinTech in the Greater Bay Area -- 3.5 Risk Prevention of FinTech in the Greater Bay Area -- 4 Conclusion -- References -- Training Mode of Applied Talents in Tourism Management Specialty Under Artificial Intelligence -- 1 Introduction -- 2 Relevant Concepts -- 2.1 AI Concept -- 2.2 Applied Talents of Tourism Major -- 2.3 Talent Training Mode -- 2.4 Basic Algorithm -- 3 Practical Research on the Talent Training Mode of Tourism Management Major from the Perspective of AI -- 3.1 Subjects -- 3.2 Experimental Steps -- 4 Statistical Analysis of Data -- 4.1 Students' Understanding of AI in Teaching -- 4.2 Students' Experience Based on AI -- 4.3 Assessment Result Analysis -- 5 Conclusion -- References -- Risk Analysis and Development Research of Cross-Border E-commerce Payment Under the Background of Internet Finance -- 1 Research on the Background of Cross-Border E-commerce Payment in China -- 1.1 Traditional Payment Cross-Border E-commerce Platform -- 1.2 Third-Party Payment Cross-Border E-commerce Platform -- 2 Internet Finance Promotes Cross-Border Electronic Payment.
3 Existing Problems and Risk Analysis of Cross-Border E-commerce Payment -- 3.1 Credit System Defects and Payment Credit Risk -- 3.2 Regulatory Risks of Big Data and User Privacy -- 3.3 Risk of Cross-Border Money Laundering and Illegal Flow of Funds -- 3.4 Legal Risks of Cross-Border Electronic Payment -- 4 Strategic Analysis and Development Research of Cross-Border Electronic Payment Industry -- 4.1 Strengthen the Supervision of Cross-Border Electronic Commerce Payment -- 4.2 Improve the Security of Third-Party Payment Information in the Era of Big Data -- 4.3 Improve the Credit Information Work and Establish an Online and Offline Credit Information System -- 4.4 Improve the Access System for Third-Party Cross-Border Payment Services -- 4.5 Attach Importance to and Strengthen Anti-money Laundering Work -- References -- The Construction and Application of Financial Sharing Service Center of Enterprise Group -- 1 The Strategic Significance of Building Financial Sharing Service Center to Strengthen Financial Control of Enterprise Groups -- 2 Principles and Key Points of Financial Sharing Service Center Construction -- 3 Core Systems and System Integration of Financial Shared Service Center Construction -- 4 Management and Control Mode and Expected Effect of Financial Shared Service Center -- 5 Financial Sharing Service Center Construction Risk and Countermeasures -- References -- Analysis on Employment Situation of Applied Universities in Transformation and Development -- 1 Introduction -- 2 Main Factors Affecting the Employment Rate of Colleges and Universities -- 2.1 The Increase of College Enrollment Leads to the Decrease of the Gold Content -- 2.2 The Leading Role of University Education is Challenged by the Development of Internet -- 2.3 The Speed of Knowledge Renewal in Colleges and Universities Lags Behind the Development of Industry.
2.4 The Motive Force for Colleges and Universities to Seek Employment Growth Point is Not Strong -- 2.5 Higher-Educated People are More Attractive to Businesses than Students -- 2.6 The Orientation of Employment of College Students is Not Accurate -- 3 Analysis of Employment Data of Jilin Agricultural Science and Technology Institute -- 4 Exploration of the Work Model Which is Favorable to the Comprehensive Quality Improvement of Employment -- 4.1 Accurate Positioning -- 4.2 Graded Advance -- 4.3 Ideological Guidance -- 4.4 Comprehensive Plan -- 5 Summary and Outlook -- References -- Corpus-Based Comparative Study on Chinese and English Subjectivity -- 1 Introduction -- 1.1 Problem and Research Question -- 1.2 Review of Literature -- 2 Research Methods -- 2.1 The Corpus and Data -- 2.2 Data Collection and Analysis -- 2.3 Results -- 3 Discussion -- 4 Conclusion -- References -- Analysis on the Development of Regional Innovation Ability Driven by Internet Under the Background of "Internet Plus" -- 1 Introduction -- 2 Theoretical Analysis -- 2.1 Cost Effect -- 2.2 Competitive Effect -- 2.3 Spillover Effect -- 3 Analysis of Existing Circumstance -- 4 Conclusion and Enlightenment -- References -- Influence Mechanism of Mobile Social Network Users' Product Recommendation Information on Consumers' Intention to Participate Sharing Economy -- 1 Introduction -- 2 Theoretical Bases -- 2.1 Theory of Planned Behavior -- 2.2 Source Credibility Theory -- 3 Influencing Mechanism Analysis -- 3.1 Influencing Mechanism of TPB Factors -- 3.2 Influence Mechanism of Source Credibility Factors -- 3.3 The Theoretical Model -- 4 Management Implication -- 4.1 Improve Consumers' Perception of Source Credibility -- 4.2 Improve Consumers' Perceived Ease-of-Use to Mobile Social Network Apps -- 5 Conclusions -- References -- Optimizing System Management Based on Trust of Domain.
1 Account Management Issues.
Record Nr. UNINA-9910488718803321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Information Systems Engineering Workshops : CAiSE 2024 International Workshops, Limassol, Cyprus, June 3–7, 2024, Proceedings / / edited by João Paulo A. Almeida, Claudio Di Ciccio, Christos Kalloniatis
Advanced Information Systems Engineering Workshops : CAiSE 2024 International Workshops, Limassol, Cyprus, June 3–7, 2024, Proceedings / / edited by João Paulo A. Almeida, Claudio Di Ciccio, Christos Kalloniatis
Autore Almeida João Paulo A
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (382 pages)
Disciplina 005.3
Altri autori (Persone) Di CiccioClaudio
KalloniatisChristos
Collana Lecture Notes in Business Information Processing
Soggetto topico Application software
Business information services
Data protection
Artificial intelligence
Software engineering
Information technology - Management
Computer and Information Systems Applications
IT in Business
Data and Information Security
Artificial Intelligence
Software Engineering
Computer Application in Administrative Data Processing
Programari d'aplicació
Protecció de dades
Intel·ligència artificial
Enginyeria de programari
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 9783031610035
9783031610028
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- BC4IS+B4TDS -- International Workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS) -- Organization -- BC4IS Workshop Co-chairs -- BC4IS Workshop Program Committee -- B4TDS Workshop Co-chairs -- B4TDS Workshop Program Committee -- Blockchain in E-Learning Platform to Enhance Trustworthy and Sharing of Micro-credentials -- 1 Introduction -- 2 Background, Related Work and Contribution -- 2.1 Micro-credentials -- 2.2 Blockchain -- 2.3 Related Work -- 2.4 Contribution -- 3 E-Learning Platform and Micro-credentials -- 4 Consortium Blockchain Within E-Learning Platforms -- 4.1 Institutions and Candidates Actions -- 5 Discussion -- 6 Conclusion -- References -- A Conceptual Model for Blockchain-Based Trust in Digital Ecosystems (Short Paper) -- 1 Introduction -- 2 Related Work -- 3 Conceptual model -- 3.1 N7: Running Example -- 3.2 Ontology of Trust in Digital ecosystems -- 3.3 The Problems of Third Parties and How Blockchain Can help -- 3.4 The Need for Capabilities Manifestation For Blockchain -- 4 Conclusion and Future work -- References -- High-Performance Confidentiality-Preserving Blockchain via GPU-Accelerated Fully Homomorphic Encryption -- 1 Introduction -- 2 Related Work -- 2.1 Confidentiality-Preserving Blockchains -- 2.2 GPU-Accelerated Fully Homomorphic Encryption -- 3 Overview -- 3.1 System Model -- 3.2 Threat Model -- 3.3 Gafe's Workflow Overview -- 4 Workflow Description -- 4.1 Client Key Generation -- 4.2 GPU-Accelerated Transaction Execution -- 5 Evaluation -- 5.1 Settings -- 5.2 End-to-End Performance -- 6 Conclusion -- References -- A Blockchain-Based Approach for Model Card Accountability and Regulatory Compliance -- 1 Introduction -- 2 Background -- 2.1 Model Cards -- 2.2 Tokenization of Model Cards -- 2.3 Motivating Scenario.
3 Proposed Approach: m-LUCE -- 3.1 Approach Overview -- 3.2 Modeling State Parameterization for Model Cards -- 4 Evaluation and Discussion -- 4.1 Functional Testing -- 4.2 Discussion -- 5 Conclusions and Future Work -- References -- HybridAIMS -- 2nd International Workshop on Hybrid Artificial Intelligence and Enterprise Modelling for Intelligent Information Systems (HybridAIMS 2024) -- Organization -- Workshop Chairs -- Program Committee -- A Hierarchical Knowledge Framework for Digital Twins of Buildings and Their Energy Systems (Position Paper) -- 1 Introduction -- 2 BIM, BMS and EMS and Digital Twins -- 3 Physics-Based Simulation and Artificial Intelligence -- 4 From Data to Wisdom, a Paradigm for Digital Twins -- 4.1 The NEST Demonstrator -- 4.2 An Implementation of the DIKW for Buildings and Energy Systems -- 4.3 Analysis of a Specific Application -- 5 Conclusion and Outlook -- References -- Integrating Generative Artificial Intelligence into Supply Chain Management Education Using the SCOR Model -- 1 Introduction -- 2 Background -- 3 Case Study: A SCM University Course -- 3.1 Generative AI Course Companion Requirements and Goals -- 3.2 Introduction to Vertex AI Search -- 3.3 Setting up the Vertex AI Search -- 3.4 Evaluation -- 3.5 Results -- 3.6 Enhancement Strategies -- 4 Implications and Further Research -- References -- An Explanation User Interface for a Knowledge Graph-Based XAI Approach to Process Analysis -- 1 Research Background and Objective -- 2 Basics of Human Interactions for XAI -- 3 Design Catalog for Explanation User Interfaces -- 4 Demonstration and Evaluation of an XUI -- 4.1 Current State of KBXAI-PA -- 4.2 Designing and Demonstrating of an XUI for KBXAI-PA -- 4.3 Evaluating the XUI for KBXAI-PA Through Expert Interviews -- 5 Key Findings, Research Perspectives and Implications -- References.
Enhancing Research Clarity: Ontology-Based Modeling of Argumentation in RPML -- 1 Introduction -- 2 Literature Review -- 2.1 Identification of a Research-Worthy Problem -- 2.2 Conceptual Modeling for Visualization of Research Problems -- 3 Methodology -- 4 An Ontological Metamodel for Research -- 5 Application of the Modelling Language -- 6 Conclusion -- References -- Student Performance Prediction Model Based on Course Description and Student Similarity -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Data Set from Student Enrolment Process -- 5 Design and Development of the Prototypes -- 5.1 Course Description Similarity -- 5.2 Course Performance Similarity -- 5.3 Performance Prediction -- 6 Evaluation -- 7 Conclusion -- References -- Towards Explainable Public Sector AI: An Exploration of Neuro-Symbolic AI and Enterprise Modeling (Short Paper) -- 1 Introduction -- 2 XAI: The Imperative for Explainability in the Public Sector -- 3 Neuro-Symbolic AI (NSAI) for Enhanced Explainability -- 4 Enterprise Modeling (EM): Discovering Rules for the Symbolic AI -- 5 Integration: Exploring the Synergy of XAI, NSAI, and EM -- 6 Conclusion and Future Work -- References -- A Survey to Evaluate the Completeness and Correctness of a Morphological Box for AI Solutions -- 1 Introduction -- 2 Theoretical Background -- 2.1 Morphological Box for AI Solutions -- 2.2 Taxonomy Development -- 3 Research and Survey Design -- 4 Analysis of the Survey Results -- 4.1 Participants -- 4.2 Statistical Evaluation -- 4.3 Feature Analysis -- 4.4 Value Analysis -- 5 Discussion -- 5.1 Possible New Features -- 5.2 Possible New Values -- 5.3 Possible Reorganization of the Values -- 6 Summary and Future Research -- References -- KG4SDSE -- Preface: 2nd Workshop on Knowledge Graphs for Semantics-Driven Systems Engineering (KG4SDSE 2024) -- Organization -- Workshop Chairs.
Web Chair -- Program Committee -- Understanding the Semantic SQL Transducer -- 1 Introduction -- 2 The Role of a Semantic SQL Transducer -- 3 Inside the Semantic SQL Transducer -- 4 Designing the Semantic SQL Transducer -- 5 Conclusions -- References -- Enhancing Complex Linguistic Tasks Resolution Through Fine-Tuning LLMs, RAG and Knowledge Graphs (Short Paper) -- 1 Introduction -- 2 Related Work -- 3 Proposed Pipeline -- 3.1 Enhancing LLMs with RAG and KGs -- 3.2 KGs Construction via Prompt Engineering -- 3.3 Guide Complex Tasks Resolution via Fine-Tuning -- 4 Conclusions and Future Work -- References -- Improving the Service Quality in Fitness Industry by Using a Knowledge Graph Based Modeling Toolkit -- 1 Introduction -- 2 Storytelling with Modeling Tools -- 3 Research Problem -- 3.1 Who -- 3.2 What -- 3.3 Why -- 3.4 How -- 3.5 Where -- 4 Conclusions -- References -- LLMs for Knowledge-Graphs Enhanced Task-Oriented Dialogue Systems: Challenges and Opportunities -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Preliminary Questions for ChatGPT -- 3.2 Ontology -- 3.3 Setup Format -- 3.4 Prompting Techniques and Examples -- 4 Results and Discussion -- 4.1 ChatGPT on the Static KGC Task -- 4.2 ChatGPT on the Temporal KGC Task -- 4.3 ChatGPT on the KGR Task -- 5 Conclusion -- References -- Property Graphs at Scale: A Roadmap and Vision for the Future (Short Paper) -- 1 Introduction -- 2 Roadmap to the Future -- 2.1 Establishing a Declarative Query Language for PGs -- 2.2 Data Integration -- 2.3 Scalable Data Processing -- 3 Conclusions -- References -- Knowledge Graph for Reusing Research Knowledge on Related Work in Data Analytics -- 1 Introduction -- 2 Research Method -- 3 Analytics Project Ontology -- 4 Real Estate Analytics Knowledge Graph -- 5 Using Knowledge Graph Based Web Application -- 6 Conclusion -- References.
An Ontology-Based Meta-modelling Approach for Semantic-Driven Building Management Systems -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Focus Group Findings -- 4 The Ontology-Based Meta-modelling Approach for Building Management Systems -- 4.1 The Ontology Architecture -- 4.2 The Ontology-Based PID Language -- 5 Evaluation -- 6 Findings and Discussion -- 7 Conclusion -- References -- EOMAS -- 20 years of the EOMAS workshop -- Organization -- Steering Committee -- Customizing a Generic Digital Transformation Objectives Model onto a Telecommunication Company -- 1 Introduction -- 2 Research Approach and Method -- 3 Results -- 3.1 Preliminary Interview Round: Domain Knowledge Collection -- 3.2 Instantiated DT Strategic Objectives Representation -- 3.3 Post Interview Round: Evaluation and Validation of the Instantiated DT Objectives Representation -- 4 Discussion -- 5 Conclusion -- References -- Analyzing Customer Sentiments: A Comparative Evaluation of Large Language Models for Enhanced Business Intelligence -- 1 Introduction -- 2 Related Work -- 2.1 Customer Sentiment Analysis -- 2.2 Methods for Sentiment Analysis -- 2.3 Using Large Language Models for Sentiment Analysis -- 3 Methodology -- 3.1 Research Question Statement -- 3.2 Selection of Large Language Models -- 3.3 Dataset Preparation -- 3.4 Exploratory Phase -- 3.5 Focused Experiments -- 3.6 Observations Analysis -- 4 Observation Analysis -- 5 Discussion -- 6 Conclusions and Future Work -- References -- Conceptual Data Normalisation from the Practical View of Using Graph Databases -- 1 Introduction -- 2 Motivation -- 3 Attempts to Overcome the Limitations of Relational Databases -- 4 Object Class Normalisation - Ambler's Approach -- 5 Frisendal's Approach to the Graph Normalisation -- 6 Our Approach to the Graph Database Normalisation -- 7 Conclusion -- References.
Deriving Object Oriented Normalisation from Conceptual Normalisation.
Record Nr. UNINA-9910865248403321
Almeida João Paulo A  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Information Systems Engineering Workshops : CAiSE 2023 International Workshops, Zaragoza, Spain, June 12–16, 2023, Proceedings / / edited by Marcela Ruiz, Pnina Soffer
Advanced Information Systems Engineering Workshops : CAiSE 2023 International Workshops, Zaragoza, Spain, June 12–16, 2023, Proceedings / / edited by Marcela Ruiz, Pnina Soffer
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (206 pages)
Disciplina 005.1
Collana Lecture Notes in Business Information Processing
Soggetto topico Application software
Information technology - Management
Business information services
Software engineering
Data protection
Computer and Information Systems Applications
Computer Application in Administrative Data Processing
IT in Business
Software Engineering
Data and Information Security
Programari d'aplicació
Procediments culinaris
Enginyeria de programari
Protecció de dades
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 9783031349850
3031349857
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- HybridAIMS -- 1st International Workshop on Hybrid Artificial Intelligence and Enterprise Modelling for Intelligent Information Systems (HybridAIMS'23) -- Organization -- HybridAIMS23 Workshop Co-chairs -- HybridAIMS23 Workshop Program Committee -- A Morphological Box for AI Solutions: Evaluation, Refinement and Application Potentials -- 1 Introduction -- 2 Theoretical Background and Related Work -- 2.1 Morphological Box for AI Solutions -- 2.2 AI Solution Development -- 3 Research Approach -- 4 Interview Planning and Conduction -- 5 Interview Findings -- 6 Analysis and Discussion -- 7 Application Potentials and Future Work -- References -- Enriching Enterprise Architecture Models with Healthcare Domain Knowledge -- 1 Introduction -- 2 Literature Review -- 2.1 Enterprise Modeling -- 2.2 Enterprise Modeling in Healthcare -- 2.3 Semantic Lifting of Enterprise Models -- 2.4 Medical Ontologies and Their Usage in Information Systems -- 2.5 Research Problem: Semantic Lifting of Enterprise Architecture Models in Healthcare -- 3 Research Method -- 4 Ontology-Based Enterprise Architecture Model Development -- 4.1 Domain Knowledge in Enterprise Architecture Model -- 4.2 Representation of Domain Knowledge as an Ontology -- 5 Ontology-Based Enterprise Architecture Model Implementation -- 6 Evaluation -- 7 Conclusion and Future Work -- References -- Supporting Reuse of Business Process Models by Semantic Annotation -- 1 Introduction -- 2 Literature Review -- 3 Research Method and Objective -- 4 Ontology Development for Model Reuse -- 5 Semantic Annotation Approach -- 6 Evaluation -- 7 Conclusion and Future Work -- References -- Position Paper - Hybrid Artificial Intelligence for Realizing a Leadership Assistant for Platform-Based Leadership Consulting -- 1 Introduction.
2 The Use Case - Development of a Platform-Based Digital Leadership Consulting -- 2.1 State-of-the-Art in Consulting 4.0 -- 2.2 Usage of Digital Platforms in Consulting -- 2.3 Challenges for Consultancies to Digitalize the Consulting Industry -- 2.4 Our Vision for Digital Leadership Consulting: The Leadership Assistant -- 3 The Need for Hybrid Artificial Intelligence -- 4 Conclusion and Outlook -- References -- Developing a Maturity Assessment Tool to Enable the Management of Artificial Intelligence for Organizations -- 1 Introduction -- 2 Research Approach -- 3 Development of the Maturity Assessment Tool -- 3.1 Objectives of the Maturity Assessment Tool -- 3.2 Design of the Horizontal User Interface Prototype -- 3.3 Demonstration and Evaluation of the Horizontal User Interface Prototype -- 3.4 Development of the Vertical Prototype -- 3.5 Demonstration and Evaluation of the Vertical Prototype -- 4 Conclusion -- References -- Mapping Time-Series Data on Process Patterns to Generate Synthetic Data -- 1 Introduction -- 2 Formalization of Control-Flow Patterns for Time-Series Data -- 2.1 Semantics of Activities -- 2.2 Sequence Pattern -- 2.3 Exclusive Choice -- 2.4 Simple Merge -- 2.5 Parallel Split -- 2.6 Synchronization -- 3 Application: Marine Time-Series Data -- 4 Implementation -- 5 Related Work -- 6 Conclusion -- References -- KG4SDSE -- 1st Workshop on Knowledge Graphs for Semantics-Driven Systems Engineering (KG4SDSE'23) -- Organization -- KG4SDSE Workshop Co-chairs -- KG4SDSE Workshop Program Committee -- Towards Crisis Response and Intervention Using Knowledge Graphs - CRISP Case Study -- 1 Introduction -- 2 CRISP Knowledge Graph -- 3 Crisis Management Model -- 4 Use Cases -- 4.1 Accessibility of Service Centers -- 4.2 Infrastructure Network Impact -- 5 Conclusions and Future Work -- References.
The RAI Way: A Technical Analysis and Design Method for Building Enterprise Semantic Layers -- 1 Introduction -- 2 The RAI Way Method -- 2.1 Example of Use -- 2.2 Concept Reification -- 2.3 Data Weaving -- 3 Related Work -- 4 Summary and Future Work -- References -- Towards Recommendations for Knowledge-Graph-Based Requirements Management in Construction: A Report on the EU DigiChecks Project -- 1 Introduction -- 2 Background and Related Work -- 2.1 Current PRM Methods in the Construction Industry -- 2.2 Usage of Knowledge Graphs in Construction -- 3 The DigiChecks Framework Overview -- 3.1 The DigiChecks Architecture -- 3.2 Requirements for Automation in PRM -- 4 Requirements Management in DigiChecks -- 4.1 Requirements Explicitness and Automation Potential -- 4.2 First Explorations of Solutions -- 5 Conclusion and Future Work -- References -- Semantic Matching Through Knowledge Graphs: A Smart City Case -- 1 Introduction -- 2 Theoretical Background and Related Work -- 2.1 Conceptual Modeling and Domain-Specific Modeling Languages -- 2.2 Knowledge Graphs, RDF and Linked Open Data -- 2.3 Related Work -- 3 Semantic Matching Between Domain-Specific Modeling Methods and Linked Open Data -- 3.1 Semantic Matching Model -- 3.2 A Smart City Implementation Scenario -- 4 Conclusion and Evaluation -- 4.1 Summary -- 4.2 SWOT Evaluation -- References -- A Linked Data Based Advanced Credit Rationale -- 1 Introduction -- 2 Approach to Create a Linked Data Based Credit Rationale -- 3 Evaluation Methodology -- 4 Results of the Evaluation -- 5 Conclusion and Future Work -- References -- Interactive Machine Learning of Knowledge Graph-Based Explainable Process Analysis -- 1 Introduction -- 2 Terms, Definitions and Previous Work -- 2.1 Terms and Definitions -- 2.2 Knowledge Graph-Based Explainable Process Analysis -- 3 Interactive Machine Learning for a Knowledge Graph.
3.1 Design -- 3.2 Assigning Weights by Verifying Results -- 3.3 Demonstration and Evaluation by a Case Study -- 4 Résumé and Perspectives -- References -- A Weighted Knowledge Graph for Representing the Results of a Systematic Literature Review -- 1 Introduction -- 2 Literature Review as the Basis of a Knowledge Graph -- 3 The Results of the Literature Review as a Knowledge Graph -- 4 Related Work and Discussion -- 5 Conclusion -- References -- Knowledge Engineering Formalizing DECENT Meta Model -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Research Approach -- 4 DECENT Knowledge Engineering -- 5 Formalization of DECENT -- 6 Evaluation -- 7 Conclusion -- Acknowledgement -- References -- Using Knowledge Graphs for Record Linkage: Challenges and Opportunities -- 1 Introduction -- 2 Background and Related Work -- 3 Using KGs for Solving RL Tasks -- 4 Concluding Remarks -- References -- Employing Knowledge Graphs for Capturing Semantic Aspects of Robotic Process Automation -- 1 Introduction -- 2 Related Work -- 3 Problem Context, Statement and Treatment -- 4 Treatment Design and Implementation -- 5 Demonstration Scenario -- 6 Query-Based Competence Evaluation -- 7 Conclusion -- References -- BC4IS and DGD -- International Workshop on Blockchain and Decentralized Governance Design for Information Systems (BC4IS'23 and DGD'23) -- Organization -- BC4IS Workshop Co-chairs -- BC4IS Workshop Steering Committee -- BC4IS Workshop Program Committee -- DGD Workshop Co-chairs -- DGD Workshop Program Committee -- Regulation-Friendly Privacy-Preserving Blockchain Based on zk-SNARK -- 1 Introduction -- 2 Related Work -- 3 Overview -- 3.1 System Model -- 3.2 Basic Workflow -- 4 Design Details of Transaction Flow -- 4.1 Initialization -- 4.2 Transaction Construction -- 4.3 Transaction Execution -- 4.4 Transaction Audit -- 5 Performance Analysis.
5.1 Results and Discussion -- 5.2 Substrate Framework -- 6 Conclusion -- References -- Blockchain Governance Design a Computer Science Perspective -- 1 Introduction -- 2 Research Approach -- 3 Conceptual Modeling for Blockchain Governance Design -- 3.1 Blockchain Networks in DAO Design Philosophy -- 3.2 Conceptual Modeling Method -- 4 Conclusion -- References -- The MEV Saga: Can Regulation Illuminate the Dark Forest? -- 1 Introduction -- 2 MEV Basics: The Dark Forest and Flash Boys 2.0 -- 3 PBS: How Does It Work and Why is it Important -- 4 Can Regulation Illuminate the Dark Forest? -- 4.1 Front-Running in Traditional Finance vs. DeFi -- 4.2 Regulating Central Points in a Decentralized World -- 5 Conclusion -- References -- Author Index.
Record Nr. UNINA-9910731476103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Artificial-Business Analytics and Quantum Machine Learning : Select Proceedings of the 3rd International Conference, Com-IT-Con 2023, Volume 1 / / edited by KC Santosh, Sandeep Kumar Sood, Hari Mohan Pandey, Charu Virmani
Advances in Artificial-Business Analytics and Quantum Machine Learning : Select Proceedings of the 3rd International Conference, Com-IT-Con 2023, Volume 1 / / edited by KC Santosh, Sandeep Kumar Sood, Hari Mohan Pandey, Charu Virmani
Autore Santosh K. C
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (810 pages)
Disciplina 006.3
Altri autori (Persone) SoodSandeep Kumar
PandeyHari Mohan
VirmaniCharu
Collana Lecture Notes in Electrical Engineering
Soggetto topico Data protection
Artificial intelligence
Application software
Data and Information Security
Artificial Intelligence
Computer and Information Systems Applications
Programari d'aplicació
Intel·ligència artificial
Protecció de dades
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 981-9725-08-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Track 1 AI & Business Analytics -- Track 2 Virtual Reality & Augmented Reality -- Track 3 Computational Biology & Bioinformatics -- Track 4 Quantum Information System -- Track 5 Block Chain & Cyber Security -- Track 6 Data Science & Machine Learning -- Track 7 Cloud Computing & Virtualisation.
Record Nr. UNINA-9910887804603321
Santosh K. C  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Android Malware Detection and Adversarial Methods / / by Weina Niu, Xiaosong Zhang, Ran Yan, Jiacheng Gong
Android Malware Detection and Adversarial Methods / / by Weina Niu, Xiaosong Zhang, Ran Yan, Jiacheng Gong
Autore Niu Weina
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (xiv, 190 pages) : illustrations
Disciplina 005.8
Altri autori (Persone) ZhangXiaosong <1968->
YanRan
GongJiacheng
Soggetto topico Computer networks - Security measures
Data protection
Data protection - Law and legislation
Machine learning
Blockchains (Databases)
Mobile and Network Security
Data and Information Security
Security Services
Privacy
Machine Learning
Blockchain
Cadena de blocs (Bases de dades)
Protecció de dades
Aprenentatge automàtic
Soggetto genere / forma Llibres electrònics
ISBN 981-9714-59-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- Preface -- Acknowledgments -- Contents -- Part I The Overview of Android Malware Detection -- 1 Introduction of Android Malware Detection -- 1.1 Android Malware Family -- 1.1.1 Trojan Horse -- 1.1.2 Viruses -- 1.1.3 The Back Door -- 1.1.4 Zombies -- 1.1.5 Espionage -- 1.1.6 Intimidation -- 1.1.7 Extortion -- 1.1.8 Advertising -- 1.1.9 Tracking -- 1.2 History of Android Malware Detection -- 1.3 Android Malware Detection Overview -- 1.4 Challenges and Apps of Android Malware Detection -- 1.5 Domestic and International Android Malware Detection -- 1.5.1 Android Malware Detection Method Based on Static Analysis -- 1.5.2 Android Malware Detection Method Based on Dynamic Analysis -- 1.5.3 Android Malware Detection Method Based on Hybrid Analysis -- 1.6 Chapter Summary -- References -- Part II The General Android Malware Detection Method -- 2 Feature Code Based Android Malware Detection Method -- 2.1 Detection Based on Traditional Feature Codes -- 2.1.1 Introduction -- 2.1.2 DroidAnalyzer: A Case Study in Android Malware Analysis -- 2.1.2.1 Suspicious Android APIs and Keywords 3 -- 2.1.2.2 Main Algorithm of DroidAnalyzer -- 2.2 Detection Based on Semantic Feature Codes -- 2.2.1 Introduction -- 2.2.2 DroidNative: A Case Study in Android Malware Analysis -- 2.2.2.1 Static Analysis in DroidNative -- 2.2.2.2 System Design and Implementation -- 2.3 Chapter Summary -- References -- 3 Behavior-Based Detection Method for Android Malware -- 3.1 Privacy Disclosure -- 3.2 Permission Escalation -- 3.2.1 Permission Escalation Method -- 3.2.2 Authorization Based on Configuration Files -- 3.2.3 Code Analysis -- 3.2.4 Taint Analysis -- 3.3 Machine Learning Technology and Malicious Behavior of Android Software -- 3.4 Chapter Summary -- References -- 4 AI-Based Android Malware Detection Methods.
4.1 Detection Based on Permissions, APIs, and Components -- 4.1.1 Permissions in Android System -- 4.1.1.1 Permissions in Android System -- 4.1.1.2 Overview of Permission-Based Detection Methods -- 4.1.2 Detection Based on API -- 4.1.3 Component-Based Detection -- 4.1.3.1 Components of an Application -- 4.1.3.2 Overview of Component-Based Detection Methods -- 4.1.4 Specific Case: Drebin -- 4.1.4.1 Static Analysis of Applications -- 4.1.4.2 Embedding in Vector Space -- 4.1.4.3 Learning-Based Detection -- 4.1.4.4 Explanation -- 4.2 Detection Anchored in Dynamic Runtime Features -- 4.2.1 Dynamic Analysis and Runtime Features -- 4.2.2 Overview of Detection Methods Based on Dynamic Runtime Features -- 4.2.3 Specific Case: EnDroid -- 4.2.3.1 Training Phase -- 4.2.3.2 Detection Phase -- 4.3 Detection Through Semantic Code Analysis -- 4.3.1 Dalvik Bytecode -- 4.3.2 Overview of Code Semantic-Based Detection Methods -- 4.3.3 Specific Case: MviiDroid -- 4.3.3.1 Static Analysis Phase -- 4.3.3.2 Feature Generation Phase -- 4.3.3.3 Model Training Phase -- 4.4 Detection via Image Analysis -- 4.4.1 Overview of Image-Based Detection Methods -- 4.4.2 Specific Case: R2-D2 -- 4.5 Detection Through Graph Analysis -- 4.5.1 Overview of Homogeneous Graph-Based Detection Methods -- 4.5.2 Overview of Heterogeneous Graph-Based Detection Methods -- 4.5.3 Case Study: HAWK -- 4.5.3.1 Feature Engineering -- 4.5.3.2 Constructing Heterogeneous Information Network (HIN) -- 4.5.3.3 Constructing Application Graph from HIN -- 4.6 Chapter Summary -- References -- Part III The Adversarial Method for Android Malware Detection -- 5 Static Adversarial Method -- 5.1 Static Obfuscation -- 5.1.1 Code Obfuscation -- 5.1.2 Resource Obfuscation -- 5.1.3 Manifest File Obfuscation -- 5.1.4 Control Flow Obfuscation -- 5.2 Common APK Static Obfuscation Tools -- 5.2.1 Obfuscapk -- 5.2.2 ProGuard.
5.2.3 DexGuard -- 5.2.4 Allatori -- 5.2.5 DashO -- 5.2.6 Bangcle -- 5.2.7 Arxan -- 5.2.8 Comparative Analysis -- 5.3 Research on Static Obfuscation -- 5.3.1 Detection Methods Based on New Features -- 5.3.1.1 Static Detection Based on Perceptual Hashing -- 5.3.1.2 Static Detection Based on Semantic Feature Set -- 5.3.1.3 Static Detection Based on Static Data Streams -- 5.3.1.4 Static Detection Based on Grayscale Images -- 5.3.1.5 Static Detection Based on Permission Pairs -- 5.3.1.6 Static Detection Based on Static Sensitive Subgraphs -- 5.3.1.7 Static Detection Based on Malicious URLs -- 5.3.2 Detection Method Based on Binding Method -- 5.3.2.1 Static Detection Combined with Dynamic -- 5.3.2.2 Static Detection Combined with Machine Learning -- 5.3.2.3 Static Detection Combined with Deep Learning -- 5.4 Chapter Summary -- References -- 6 Dynamic Adversarial Method in Android Malware -- 6.1 Automatic Dynamic Analysis Evasion -- 6.1.1 Detection Dependent -- 6.1.1.1 Fingerprint -- 6.1.1.2 Reverse Turing Test -- 6.1.1.3 Target -- 6.1.2 Detection Independent -- 6.1.2.1 Stalling -- 6.1.2.2 Trigger-Based -- 6.1.2.3 Fileless Attack -- 6.2 Manual Dynamic Analysis Evasion -- 6.2.1 Direct Detection -- 6.2.1.1 Read PEB -- 6.2.1.2 Breakpoint Query -- 6.2.1.3 System Artifacts -- 6.2.1.4 Parent Process Detection -- 6.2.2 Deductive Detection -- 6.2.2.1 Trap -- 6.2.2.2 Time-Based Detection -- 6.2.3 Debugger Evasion -- 6.2.3.1 Control Flow Manipulation -- 6.2.3.2 Lockout Evasion -- 6.2.3.3 Debugger Identification -- 6.2.3.4 Fileless Malware -- 6.3 Related Research About Dynamic Analysis Evasion -- 6.3.1 Research About Improving Sandbox -- 6.3.1.1 The Droid is in the Details: Environment-Aware Evasion of Android Sandboxes -- 6.3.1.2 Morpheus: Automatically Generating Heuristics to Detect Android Emulators -- 6.3.2 Research About Detecting Dynamic Evasion.
6.3.2.1 CamoDroid: An Android App Analysis Environment Resilient Against Sandbox Evasion -- 6.3.2.2 Lumus: Dynamically Uncovering Evasive Android apps -- 6.4 Chapter Summary -- References -- 7 AI-Based Adversarial Method in Android -- 7.1 Introduction to Adversarial Examples -- 7.2 Classification of Adversarial Example Generation Methods -- 7.2.1 Gradient-Based Attacks -- 7.2.2 Optimization-Based Attacks -- 7.2.3 GAN-Based Attacks -- 7.2.4 Domain-Specific Attacks (Audio, Images, Text, etc.) -- 7.3 Black-Box Attacks -- 7.3.1 Introduction to Black-Box Attacks -- 7.3.2 Common Black-Box Attack Methods -- 7.3.3 Transfer Learning-Based Black-Box Attacks -- 7.3.4 Meta-Model Based Black-Box Attacks -- 7.3.5 Query-Based Attacks -- 7.3.6 Optimization-Based Attacks -- 7.4 White-Box Attacks -- 7.4.1 Optimization-Based Attacks -- 7.4.1.1 C& -- W Attack -- 7.4.1.2 PGD Attack -- 7.4.2 Gradient-Based Attacks -- 7.4.2.1 FGSM Attack -- 7.4.2.2 BIM Attack -- 7.4.3 App of Adversarial Attacks in Malware Detection -- 7.5 Chapter Summary -- References -- Part IV The Future Trends of Android Malware Detection -- 8 Future Trends in Android Malware Detection -- 8.1 Machine Learning And Deep Learning Techniques -- 8.1.1 Overview of Machine Learning and Deep Learning for Android Malware Detection -- 8.1.2 Challenges Faced -- 8.2 Integrated Solutions -- 8.2.1 Challenges Faced -- 8.3 Blockchain Technology -- 8.3.1 Introduction to Blockchain Technology -- 8.3.2 Examples of Blockchain Technology in the Field of Android Malware Detection -- 8.4 Hardware Technology -- 8.4.1 Advantages of Hardware Technology -- 8.4.2 Challenges to Hardware Technology -- 8.4.3 Examples of Hardware Technologies Applied in the Field of Android Malware Detection -- 8.5 BPF Technology -- 8.5.1 Development of BPF Technology -- 8.5.2 eBPF Technology Overview.
8.5.3 Examples of BPF Techniques in the Field of Android Malware Detection -- 8.6 Chapter Summary -- References.
Record Nr. UNINA-9910864193603321
Niu Weina  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security : 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I / / edited by Christina Pöpper, Lejla Batina
Applied Cryptography and Network Security : 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I / / edited by Christina Pöpper, Lejla Batina
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (509 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data structures (Computer science)
Information theory
Operating systems (Computers)
Application software
Cryptography
Data encryption (Computer science)
Data and Information Security
Data Structures and Information Theory
Operating Systems
Computer and Information Systems Applications
Cryptology
Security Services
Protecció de dades
Estructures de dades (Informàtica)
Teoria de la informació
Sistemes operatius (Ordinadors)
Programari d'aplicació
Xifratge (Informàtica)
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-031-54770-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Abstracts of Keynote Talks -- Applying Machine Learning to Securing Cellular Networks -- Real-World Cryptanalysis -- CAPTCHAs: What Are They Good For? -- Contents - Part I -- Contents - Part II -- Contents - Part III -- Cryptographic Protocols -- CryptoZoo: A Viewer for Reduction Proofs -- 1 Introduction -- 2 Related Work -- 3 State-Separating Proofs -- 4 A Proof Viewer for SSPs -- 4.1 Proof Viewing Concepts -- 4.2 Implementation Considerations -- 5 Case Study: IND-CPA Vs. Simulation-Based Security -- 6 Case Study: Constant-Depth GGM Tree -- 7 Case Study: Yao's Garbling Scheme -- 8 Comparison -- 8.1 Yao's Garbling Scheme -- 8.2 SSP Proofs of TLS 1.3 -- 8.3 SSP Proofs of the MLS Key Schedule -- 8.4 Formal Verification Tools for SSPs -- 9 Conclusion and Future Work -- References -- Element Distinctness and Bounded Input Size in Private Set Intersection and Related Protocols -- 1 Introduction -- 2 Related Work and Background -- 2.1 Private Set Intersection (PSI) -- 2.2 PSI Variants -- 2.3 PSI with Restrictions -- 2.4 PSI with Multiset Input -- 2.5 Zero-Knowledge Proofs -- 2.6 Homomorphic Encryption -- 3 Proving Element Distinctness -- 3.1 Puzzle-Based PoED Construction -- 3.2 Analysis of PoED-Puzzle Protocol -- 4 PSI with Element Distinctness Check -- 4.1 Adversary Model -- 4.2 Definition of AD-PSI -- 4.3 A Construction for AD-PSI Based on PoED-puzzle -- 4.4 Alternative AD-PSI and Modified Construction -- 5 AD-PSI Variants -- 5.1 PSI-CA with Element Distinctness (AD-PSI-CA) -- 5.2 PSI-X with Element Distinctness (AD-PSI-X) -- 5.3 PSI-DT with Element Distinctness (AD-PSI-DT) -- 6 Completing Bounded-Size-Hiding-PSI -- 7 Authorized PSI with Element Distinctness -- 7.1 AD-APSI Definition -- 7.2 AD-APSI Construction -- 7.3 Security Analysis -- 8 Conclusion -- A Security Proof for AD-PSI-puzzle -- B AD-PSI Variants.
C Security Proof for AD-APSI -- References -- A New Approach to Efficient and Secure Fixed-Point Computation -- 1 Introduction -- 1.1 Related Work -- 1.2 Construction Blueprint -- 2 Preliminaries -- 2.1 UC Functionalities -- 3 Truncation -- 3.1 RNS in MPC -- 3.2 Fixed-Point Arithmetic -- 4 The Construction -- 4.1 Preprocessing -- 4.2 Lifting -- 4.3 Probabilistic Truncation -- 4.4 Error Reduction -- 5 Efficiency -- 5.1 Implementation -- 5.2 Comparison with Related Techniques -- References -- Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing -- 1 Introduction -- 2 Preliminaries -- 3 Auditable Attribute-Based Credentials Scheme -- 3.1 Auditable Public Keys -- 3.2 Formal Definitions of Auditable ABC -- 3.3 Our Constructions and Analysis -- 4 Application: Contact Tracing -- 4.1 An Auditable ABC-Based Construction -- 4.2 Security and Analysis -- 4.3 Implementation -- 5 Conclusion -- A The Necessity of Enhancing Contact Tracing Systems -- B The SPS-EQ Scheme from ch4spseqspspkc2022 -- C Extending the BLS Signature ch4bls01 with APK -- References -- Verification Protocol for Stable Matching from Conditional Disclosure of Secrets -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Applications -- 1.3 Organization -- 2 Related Works -- 2.1 Stable Matching -- 2.2 Conditional Disclosure of Secrets -- 2.3 Multi-client Verifiable Computation -- 3 Preliminaries -- 3.1 Stable Matching -- 3.2 Conditional Disclosure of Secrets -- 3.3 Multi-client Verifiable Computation -- 3.4 Secret Sharing -- 4 Proposed CDS Schemes -- 4.1 CDS Scheme for Unstable Matching -- 4.2 CDS Scheme for Stable Matching -- 4.3 Possible Improvements -- 5 Verification Protocol for Stable Matching -- 6 Implementation -- 7 Concluding Remarks -- References -- Non-malleable Fuzzy Extractors -- 1 Introduction -- 1.1 Our Results -- 1.2 Related Work -- 2 Preliminaries.
2.1 (Keyless) Fuzzy Extractors -- 2.2 Non-malleable Codes -- 3 Non-malleable Fuzzy Extractors -- 4 Construction -- 5 Fuzzy Tamper-Resilient Security -- 6 Conclusions -- References -- Upgrading Fuzzy Extractors -- 1 Introduction -- 1.1 Our Contribution -- 1.2 Related Work -- 1.3 Discussion and Future Work -- 2 Preliminaries -- 2.1 Entropy Definitions -- 2.2 Obfuscation Definitions -- 2.3 Fuzzy Extractors -- 3 Weakly-Private Fuzzy Extractors -- 3.1 Weakly Private FE from FE and MBCC Obfuscation -- 3.2 Weakly Private FE from Secure Sketch and MBCC Obfuscation -- 4 Robustness -- 5 Reuse -- A Privacy vs FE Security -- B Reusability from Composable MBCC Obfuscation -- References -- X-Lock: A Secure XOR-Based Fuzzy Extractor for Resource Constrained Devices -- 1 Introduction -- 2 Related Works -- 3 Background -- 4 X-Lock: Construction Details -- 5 X-Lock: Algorithm Analysis -- 5.1 Security Analysis -- 5.2 Bias and Correlation Analysis -- 5.3 Costs Analysis -- 6 Implementation and Comparison -- 7 Conclusion -- References -- Encrypted Data -- Efficient Clustering on Encrypted Data -- 1 Introduction -- 2 Related Works -- 3 Background -- 3.1 Approximate Homomorphic Encryption CKKS -- 3.2 Newton's Method -- 4 System Architecture and Threat Model -- 4.1 System Architecture -- 4.2 Threat Model -- 4.3 Security -- 5 Fully Privacy-Preserving Clustering Scheme Based on FHE -- 5.1 Preliminaries -- 5.2 Ciphertext Comparison -- 5.3 Ciphertext Division -- 5.4 Converting the One-Hot Vectors to Label in Plaintexts -- 5.5 The Complete Algorithm for Privacy-Preserving Clustering -- 5.6 Security Proof -- 6 An Optimized Algorithm -- 6.1 Block Clustering Scheme -- 6.2 Block Clustering Scheme with Cluster Selection -- 7 Experiment Results -- 7.1 Experiment Setup -- 7.2 Clustering Accuracy -- 7.3 Run Time -- 7.4 Performance of Block Clustering Scheme with Cluster Selection.
8 Conclusions -- References -- Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search -- 1 Introduction -- 2 Preliminaries -- 2.1 PAEKS -- 2.2 0/1 Encodings -- 3 Definition of FS-PAEKS -- 4 Our Generic Construction of FS-PAEKS -- 5 Security Analysis -- 6 Vulnerability of the Jiang Et Al. FS-PAEKS Scheme -- 7 Conclusion -- References -- Encryption Mechanisms for Receipt-Free and Perfectly Private Verifiable Elections -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Our Techniques -- 1.3 Related Work -- 1.4 Overview of Paper -- 2 Background -- 2.1 Assumptions and Primitives -- 2.2 Traceable Receipt-Free Encryption (TREnc) -- 2.3 Commitment Consistent Encryption (CCE) -- 3 The Construction of Our Scheme -- 3.1 Description -- 3.2 Verification Equations -- 3.3 Security Analysis -- 3.4 Efficiency -- 4 Application to E-Voting -- 4.1 Voting Scheme with a Homomorphic Tally -- 4.2 Voting Scheme with a Mixnet Tally -- 5 Conclusion -- A Scheme Description for Complex Ballots -- B Deferred Proofs -- B.1 Correctness -- B.2 Strong Randomizability -- B.3 TCCA Security -- B.4 Traceability -- B.5 Verifiability -- References -- Two-Party Decision Tree Training from Updatable Order-Revealing Encryption -- 1 Introduction -- 1.1 Related Work -- 1.2 Our Contribution -- 1.3 Outline -- 2 Preliminaries -- 2.1 The Universal Composability Model -- 2.2 Order-Revealing Encryption -- 2.3 Decision Tree Training -- 3 Updatable Order-Revealing Encryption -- 4 Secure Decision Tree Training -- 4.1 Variations of the Training Process -- 4.2 Graceful Degradation Using Enclaves -- 5 Analysis of the Leakage -- 5.1 Leakage for Random Message Selection -- 5.2 Additional Leakage for Malicious Message Selection -- 5.3 Transformation for Non-uniform Distributions -- 6 Implementation and Evaluation -- 6.1 Evaluation of the Updatable ORE Scheme.
6.2 Evaluation of the Protocol -- 7 Conclusion -- A A Brief Introduction to the UC Framework -- References -- KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More -- 1 Introduction -- 1.1 Research Challenges -- 1.2 Contributions -- 1.3 Organization -- 2 Preliminaries -- 3 Committing Security with Plaintext Redundancy -- 3.1 Plaintext with Redundancy -- 3.2 Definitions for Committing Security with Redundancy -- 4 KIVR Transform -- 4.1 Specification of KIVR -- 4.2 Security of KIVR -- 5 Committing Security of KIVR with CTR-Based AE -- 5.1 Specification of CTR-Based AE -- 5.2 CMT-4-Security of KIVR[CTRAE] -- 6 Proof of Theorem 1 -- 6.1 Tools -- 6.2 Symbol Definitions -- 6.3 Deriving the CMT-4-Security Bound -- 6.4 Bounding Pr[(C,T)=(C,T) coll] -- 7 Committing Security of KIVR with GCM, GCM-SIV, and CCM -- 7.1 Specifications of GCM, GCM-SIV, and CCM -- 7.2 CMT-4-Security of KIVR[GCM], KIVR[GCM-SIV], and KIVR[CCM] -- 7.3 Tightness of the CMT-4-Security of KIVR[GCM] and KIVR[GCM-SIV] -- 7.4 On the Tightness of CMT-4-Security of KIVR[CCM] -- 8 Committing Security of KIVR with CTR-HMAC -- 8.1 Specification of CTR-HMAC -- 8.2 CMT-4-Security Bound of KIVR[CTR-HMAC] -- 8.3 Tightness of the CMT-4-Security of KIVR[CTR-HMAC] -- 9 Conclusion -- A Multi-user Security for AE -- B Multi-user PRF Security -- C mu-AE Security of AE Schemes with KIVR -- D Proof of Theorem 2 for KIVR[GCM-SIV] -- E Proof of Theorem 3 -- References -- Signatures -- Subversion-Resilient Signatures Without Random Oracles -- 1 Introduction -- 1.1 Subversion-Resilient Signatures with Watchdogs -- 1.2 Technical Challenges -- 1.3 Our Contributions -- 1.4 Alternative Models -- 2 Model and Preliminaries -- 2.1 Notation and Model -- 2.2 Subversion-Resilience -- 2.3 Achieving Subversion-Resilience -- 2.4 Assumptions -- 2.5 Pseudorandom Functions.
3 Subversion-Resilient One-Way Functions.
Record Nr. UNINA-9910842286403321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security : 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II / / edited by Christina Pöpper, Lejla Batina
Applied Cryptography and Network Security : 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II / / edited by Christina Pöpper, Lejla Batina
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (523 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data structures (Computer science)
Information theory
Operating systems (Computers)
Application software
Cryptography
Data encryption (Computer science)
Data and Information Security
Data Structures and Information Theory
Operating Systems
Computer and Information Systems Applications
Cryptology
Security Services
Protecció de dades
Estructures de dades (Informàtica)
Teoria de la informació
Sistemes operatius (Ordinadors)
Programari d'aplicació
Xifratge (Informàtica)
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-031-54773-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Abstracts of Keynote Talks -- Applying Machine Learning to Securing Cellular Networks -- Real-World Cryptanalysis -- CAPTCHAs: What Are They Good For? -- Contents - Part II -- Post-quantum -- Automated Issuance of Post-Quantum Certificates: A New Challenge -- 1 Introduction -- 2 Background -- 2.1 TLS Version 1.3 -- 2.2 ACMEv2 Characteristics -- 2.3 Post-Quantum Cryptography -- 3 Quantum Threat and PQC Adoption -- 3.1 Quantum Threats in ACME -- 3.2 Integrating PQC Algorithms -- 3.3 Impacts of PQC in ACME -- 4 Proposed ACME Challenge -- 4.1 Design Details -- 4.2 Issuance and Renewal Timings -- 4.3 Discussion -- 5 Final Remarks and Future Work -- A ACME's HTTP-01 Challenge -- B POST Request Example -- References -- Algorithmic Views of Vectorized Polynomial Multipliers - NTRU Prime -- 1 Introduction -- 1.1 Contributions -- 1.2 Code -- 1.3 Structure of This Paper -- 2 Preliminaries -- 2.1 Polynomials in NTRU Prime -- 2.2 Cortex-A72 -- 2.3 Modular Arithmetic -- 3 Fast Fourier Transforms -- 3.1 The Chinese Remainder Theorem (CRT) for Polynomial Rings -- 3.2 Cooley-Tukey FFT -- 3.3 Bruun-Like FFTs -- 3.4 Good-Thomas FFTs -- 3.5 Rader's FFT for Odd Prime p -- 3.6 Schönhage's and Nussbaumer's FFTs -- 4 Implementations -- 4.1 The Needs of Vectorization -- 4.2 Good-Thomas FFT in ``BigSmall'' Polynomial Multiplications -- 4.3 Good-Thomas, Schönhage's, and Bruun's FFT -- 4.4 Good-Thomas, Rader's, and Bruun's FFT -- 5 Results -- 5.1 Benchmark Environment -- 5.2 Performance of Vectorized Polynomial Multiplications -- 5.3 Performance of Schemes -- A Detailed Performance Numbers -- References -- Efficient Quantum-Safe Distributed PRF and Applications: Playing DiSE in a Quantum World -- 1 Introduction -- 1.1 Related Works and Our Contributions -- 2 Preliminaries and Background -- 2.1 Notation.
2.2 Some Terminologies and Definitions -- 2.3 Distributed PRF (DPRF) -- 2.4 (t, T)-Threshold Secret Sharing -- 3 Our Contribution: Proposed Distributed PRF -- 3.1 Underlying Quantum-Safe PRF -- 3.2 Proposed (T, T)-Distributed PRF -- 3.3 Generalised (t, T)-Threshold PRF -- 3.4 Choice of Parameters -- 3.5 Proposed PQDPRF vs. the Lattice-Based DPRF in ch3libert2021adaptively -- 4 Application -- 4.1 An Overview of the DiSE Protocol -- 4.2 Our Improved PQ-DiSE Protocol -- 5 Experimental Result -- 6 Conclusion and Future Work -- A Generalised (t, T)-Threshold PRF -- A.1 Proof of Correctness and Consistency -- A.2 Proof of Security -- References -- On the Untapped Potential of the Quantum FLT-Based Inversion -- 1 Introduction -- 1.1 Background -- 1.2 Our Contribution -- 2 Preliminaries -- 2.1 Binary Elliptic Curve Discrete Logarithm Problem -- 2.2 Quantum Computation in F2n -- 2.3 Shor's Algorithm for Solving the Binary ECDLP -- 3 Our Method -- 3.1 Register-Bounded Addition Chain -- 3.2 Modified Quantum Point Addition Algorithm -- 3.3 Depth Reduction of Quantum Multiple Squaring Circuits -- 3.4 Proposed Inversion Algorithm -- 4 Comparison -- 4.1 Our Choice of Register-Bounded Addition Chains -- 4.2 Quantum Resources Trade-Off in Our Proposed Inversion Algorithm -- 4.3 Comparison with Previous Methods in Shor's Algorithm -- References -- Breaking DPA-Protected Kyber via the Pair-Pointwise Multiplication -- 1 Introduction -- 1.1 Our Contribution -- 1.2 State of the Art -- 2 Notation and Preliminaries -- 2.1 Kyber -- 2.2 Number Theoretic Transform (NTT) -- 2.3 Online Template Attacks -- 3 Our Attack -- 3.1 Attack Steps-Extracting the Key via q+q Templates -- 3.2 Attack on DPA-Protected Kyber -- 4 Simulations -- 4.1 Implementation of Pair-Point Multiplication -- 4.2 Hamming Weight Model -- 4.3 Simulations of Gaussian Noise -- 5 Experimental Evidence.
5.1 Attack Analysis -- 6 Possible Countermeasures -- A Kyber Algorithms -- B Montgomery Reduction -- C Details on Noiseless and Noisy Simulations -- D Comparison -- References -- Cryptographic Protocols II -- The Key Lattice Framework for Concurrent Group Messaging -- 1 Introduction -- 1.1 Related Work -- 1.2 Technical Overview -- 2 General Definitions and Notation -- 3 Key Lattice -- 3.1 Key Evolution -- 3.2 The Key Graph -- 3.3 Instantiation -- 3.4 Key Lattice as a Key Management Technique -- 4 Group Key Agreement -- 5 Group Randomness Messaging -- 5.1 Instantiation -- 6 Group Messaging -- 6.1 Security Definition -- 6.2 GM from GRM and GKA -- 6.3 Concrete Costs -- 6.4 Main Theorem -- References -- Identity-Based Matchmaking Encryption from Standard Lattice Assumptions -- 1 Introduction -- 2 Preliminaries -- 2.1 Identity-Based Matchmaking Encryption -- 2.2 Homomorphic Signatures -- 3 IB-ME: Generic Construction -- 3.1 IB-ME Achieving Enhanced Privacy -- 3.2 Achieving Authenticity -- 3.3 Security Analysis -- 4 Instantiations from Lattice Assumptions -- 5 Conclusions -- A Reusable Computational Extractors -- B Identity-Based Encryption -- C Indistinguishable from Random Privacy vs Enhanced Privacy -- References -- Decentralized Private Stream Aggregation from Lattices -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Related Work -- 1.3 Organization -- 2 Preliminaries -- 2.1 Lattices -- 2.2 Learning with Errors -- 2.3 Pseudorandom Functions -- 3 Decentralized Private Stream Aggregation -- 3.1 Our Construction -- 3.2 Aggregator Obliviousness -- 3.3 Parameters -- 3.4 Decentralized Setup -- 3.5 Client Failures -- 3.6 Optimizing Peer-to-Peer Communication -- 3.7 Dynamic Join and Leave -- 4 DPSA in the Standard Model -- 5 Conclusion -- A Private Stream Aggregation -- B Games for the Proof of Theorem 1 -- References -- Wireless and Networks.
A Security Analysis of WPA3-PK: Implementation and Precomputation Attacks -- 1 Introduction -- 2 Background -- 2.1 Simultaneous Authentication of Equals (SAE) -- 2.2 WPA3 Public Key (WPA3-PK) -- 2.3 Generation of the WPA3-PK Password -- 2.4 Security Guarantees Provided by WPA3-PK -- 3 Implementation and Network-Based Attacks -- 3.1 Bad Randomness Leaks the Password -- 3.2 Network-Based Attacks -- 4 Precomputation Attacks and Rainbow Tables -- 4.1 Background on Time-Memory Trade-Off Attacks -- 4.2 Motivation: SSID Reuse -- 4.3 Baseline Precomputation Attack Against WPA3-PK -- 4.4 Improved Analysis of the Baseline Precomputation Attack -- 4.5 Rainbow Tables for WPA3-PK -- 4.6 Rainbow Table: Performance Experiments -- 5 Multi-network Password Collisions -- 5.1 Constructing Password Collisions -- 5.2 Public Key Embedding and Trailing Data -- 5.3 Accepting Trailing Data Inside the Public Key -- 5.4 Multi-network Password Collisions -- 6 Defenses and Discussion -- 6.1 Handling Bad Randomness: Encrypting the Public Key -- 6.2 Preventing Network-Layer Attacks -- 6.3 Mitigating Time-Memory Trade-Off Attacks -- 6.4 Preventing Password Collisions: Committing to an SSID Length -- 7 Related Work -- 8 Conclusion -- References -- When and How to Aggregate Message Authentication Codes on Lossy Channels? -- 1 Introduction -- 2 MAC Aggregation on Lossy Channels -- 2.1 Message Authentication Codes -- 2.2 MAC Aggregation to Combat Bandwidth Scarcity -- 2.3 Introducing Existing MAC Aggregation Schemes -- 2.4 Interplay of Lossy Channels and MAC Aggregation -- 3 Synthetic Measurements -- 3.1 Simulation Setup -- 3.2 Influence of Channel Quality on Goodput -- 3.3 Influence of Payload Length on Goodput -- 3.4 Optimal Packet Lengths for Authenticated Data -- 4 MAC Aggregation in Real-World Scenarios -- 4.1 Description of the Scenarios.
4.2 Evaluating MAC Aggregation in Realistic Scenarios -- 5 Beyond Goodput as Evaluation Metric -- 5.1 Average Delay Until Authentication -- 5.2 Performance and Memory Overhead -- 5.3 Resilience to Adversarial Interference -- 6 Guidelines on Employing MAC Aggregation -- 6.1 When to Use MAC Aggregation on Lossy Channels? -- 6.2 How to Employ MAC Aggregation on Lossy Channels? -- 6.3 Selecting an MAC Aggregation Scheme -- 7 Conclusion -- References -- DoSat: A DDoS Attack on the Vulnerable Time-Varying Topology of LEO Satellite Networks -- 1 Introduction -- 2 Background and Related Work -- 2.1 LEO Satellite Network -- 2.2 Denial-of-Service Attack -- 2.3 LSN Simulation -- 3 DoSat Attack -- 3.1 Threat Model -- 3.2 Feasibility Analysis -- 3.3 DoSat Overview -- 3.4 Attack Mechanism -- 4 Simulation and Evaluation -- 4.1 Simulation Setup -- 4.2 Network Setup -- 4.3 Evaluation Metrics -- 4.4 Results -- 5 Mitigations -- 6 Conclusion -- References -- DDoSMiner: An Automated Framework for DDoS Attack Characterization and Vulnerability Mining -- 1 Introduction -- 2 Background and Related Work -- 2.1 TCP-Based DDoS Attacks -- 2.2 DDoS Mining/Exploit Schemes -- 2.3 Exploration TCP Stack with Symbolic Execution -- 3 Threat Model and Problem Definition -- 3.1 Threat Model -- 3.2 Problem Definition -- 4 Workflow of DDoSMiner -- 4.1 Generation of Attack Call Flow Graph -- 4.2 Selective Symbolic Execution -- 5 Evaluation -- 5.1 Experiment Configuration -- 5.2 Attack Call Flow Graph Analysis -- 5.3 Symbol Execution Experiment Setup -- 5.4 Symbolic Execution Results -- 5.5 Evasion Evaluation Against IDS -- 6 Conclusion -- 7 Limitations and Future Work -- A Visualization and Analysis of System Calls -- B The Kernel Address Corresponding to the Full Drop Nodes for Six Categories of Attacks -- References -- Privacy and Homomorphic Encryption.
Memory Efficient Privacy-Preserving Machine Learning Based on Homomorphic Encryption.
Record Nr. UNINA-9910842279903321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security : 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part III / / edited by Christina Pöpper, Lejla Batina
Applied Cryptography and Network Security : 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part III / / edited by Christina Pöpper, Lejla Batina
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (476 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Data structures (Computer science)
Information theory
Operating systems (Computers)
Application software
Cryptography
Data encryption (Computer science)
Data and Information Security
Data Structures and Information Theory
Operating Systems
Computer and Information Systems Applications
Cryptology
Security Services
Protecció de dades
Estructures de dades (Informàtica)
Teoria de la informació
Sistemes operatius (Ordinadors)
Programari d'aplicació
Xifratge (Informàtica)
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-031-54776-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Abstracts of Keynote Talks -- Applying Machine Learning to Securing Cellular Networks -- Real-World Cryptanalysis -- CAPTCHAs: What Are They Good For? -- Contents - Part III -- Blockchain -- Mirrored Commitment: Fixing ``Randomized Partial Checking'' and Applications -- 1 Introduction -- 1.1 Notation -- 2 Chaumian Randomized Partial Checking (RPC) Mix Net -- 2.1 Protocol Description -- 2.2 RPC Audit -- 2.3 Attacks on RPC -- 3 Mirrored Randomized Partial Checking (mRPC) -- 3.1 Protocol Description -- 3.2 mRPC Audit -- 3.3 Attack Examples on mRPC -- 3.4 Security of mRPC -- 4 Privacy Guarantees of RPC and mRPC -- 4.1 Constant Number of Mix-Servers -- 4.2 Mixing Time -- 5 Application: CryptoCurrency Unlinkability -- 6 Conclusions -- A Proofs -- A.1 Proof of Lemma 4 -- A.2 Proof of Lemma 6 -- A.3 Proof of Lemma 7 -- References -- Bitcoin Clique: Channel-Free Off-Chain Payments Using Two-Shot Adaptor Signatures -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Related Work -- 2 Preliminaries -- 3 Model -- 3.1 Blockchain and Transaction Model -- 3.2 Commit-Chain Model -- 3.3 Communication and Adversarial Assumptions -- 3.4 Security and Performance Guarantees -- 4 Protocol Overview -- 5 Bitcoin Clique Protocol -- 6 Future Work -- A Bitcoin Clique Healing -- A.1 Healing Extension Details -- A.2 Discussion and Future Work -- References -- Programmable Payment Channels -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Related Work -- 2 Preliminaries -- 3 Programmable Payment Channels -- 3.1 Defining FPPC -- 3.2 PPC Preliminaries -- 3.3 Ideal Functionality FPPC -- 3.4 Concrete Implementation of FPPC -- 3.5 Lightweight Applications of Programmable Payments -- 3.6 Implementation and Evaluation -- 4 State Channels from FPPC -- 4.1 Modifying FPPC to Capture State Channels -- 4.2 Defining FSC.
4.3 Implementing FSC in theFPPC-Hybrid World -- 5 Conclusions -- References -- Fair Private Set Intersection Using Smart Contracts -- 1 Introduction -- 1.1 Other Coin-Compensated PSI -- 2 Related Work -- 3 Preliminaries and Notations -- 4 Fair PSI Using Smart Contracts -- 4.1 Smart Contract as the TTP in Optimistic Mutual PSI -- 4.2 Security Model -- 4.3 Ideal Functionality for Coin-Compensated PSI -- 5 A Coin-Compensated Fair SC-Aided PSI -- 5.1 Security Analysis -- 6 Improving the Efficiency of -- 6.1 Our Technique for Optimizing the Protocol -- 6.2 Overview of * -- 6.3 Security Analysis -- 7 Complexity Analysis -- 8 Implementation -- 8.1 Evaluation -- 9 Concluding Remarks -- References -- Powers-of-Tau to the People: Decentralizing Setup Ceremonies -- 1 Introduction -- 2 Related Work -- 2.1 Multiparty Setup Ceremonies -- 2.2 Setup Ceremonies in Practice -- 2.3 Proof Systems with Transparent Setup -- 3 A Powers-of-Tau System: Definitions -- 4 Powers-of-Tau Setup with Full Data On-Chain -- 4.1 Security -- 5 Powers-of-Tau Setup Protocol with Data Off-Chain -- 5.1 Off-Chain Setup Using a Transparent Succinct Proof -- 5.2 Off-Chain Setup Using AFGHO Commitments On-Chain -- 6 Implementation and Evaluation on Ethereum -- 7 Concluding Discussion and Open Problems -- 7.1 Incentives for Participation -- 7.2 Verifying Participation -- 7.3 Sequential Participation and Denial-of-Service -- 7.4 Verification with General-Purpose Roll-Ups -- 7.5 Protocol-Specific ZK Rollups via Proof Batching -- 7.6 Protocol-Specific Optimistic Verification and Checkpointing -- 7.7 Fully Off-Chain Verification via IVC/PCD -- 7.8 Forking/Re-starting -- A Proof of Theorem 2 -- B Inner-Pairing Product Arguments for Sect.5.2 -- C Off-Chain Setup from IPP Arguments with a Smaller Setup -- D Powers-of-Tau with a Punctured Point -- References.
Smart Infrastructures, Systems and Software -- Self-sovereign Identity for Electric Vehicle Charging -- 1 Introduction -- 2 Background -- 2.1 E-mobility -- 2.2 Self-Sovereign Identity (SSI) -- 3 Related Work -- 4 System Model and Requirement Analysis -- 4.1 Scope -- 4.2 Attacker Model -- 4.3 Functional Requirements -- 4.4 Security and Privacy Requirements -- 5 SSI Concept -- 5.1 Concept Overview -- 5.2 Provisioning DID Creation -- 5.3 Contract Credential Installation -- 5.4 Charging Process and Credential Validation -- 5.5 Integration into ISO 15118-20 -- 6 Implementation -- 7 Evaluation -- 7.1 Performance Measurements -- 7.2 Security and Privacy Analysis with Tamarin -- 7.3 Discussion of Requirements -- 8 Conclusion -- References -- ``Hello? Is There Anybody in There?'' Leakage Assessment of Differential Privacy Mechanisms in Smart Metering Infrastructure -- 1 Introduction -- 2 Preliminaries -- 2.1 Differential Privacy -- 2.2 Statistical t-test Analysis -- 3 System and Threat Model -- 3.1 Threat Surfaces -- 3.2 Capabilities of the Adversary -- 3.3 Goal of the Adversary -- 4 Formal Analysis of Leakage Due to Privacy-Utility Trade-Off in Smart Metering Systems -- 5 Proposed Attack Methodology -- 5.1 Precomputation Phase -- 5.2 t-test Based Attack Methodology -- 6 Evaluation of the Proposed Attack Methodology -- 6.1 Experimental Setup -- 6.2 Experimental Evaluation -- 7 Discussion -- 8 Conclusion and Future Work -- References -- Security Analysis of BigBlueButton and eduMEET -- 1 Introduction -- 2 Background -- 2.1 WebRTC -- 2.2 WebRTC Architectures in Conferencing Systems -- 3 Analysis Method -- 3.1 High-Level Analysis -- 3.2 Source Code Supported Security Analysis -- 4 Architectures of the Analyzed Open-Source Conferencing Systems (RQ1) -- 4.1 Shared Architecture -- 4.2 Implementation of BigBlueButton -- 4.3 Implementation of eduMEET.
5 Features and User Roles (RQ2) -- 5.1 Comparison of Features -- 5.2 User Roles -- 6 Attacker Model -- 7 Evaluation (RQ3) -- 7.1 BigBlueButton -- 7.2 eduMEET -- 7.3 Responsible Disclosure -- 8 Discussion -- 8.1 BigBlueButton -- 8.2 eduMEET -- 8.3 Limitations -- 9 Related Work -- 10 Conclusions and Future Work -- A Appendix -- A.1 eduMEET -- A.2 Status of Fixes in BigBlueButton -- References -- An In-Depth Analysis of the Code-Reuse Gadgets Introduced by Software Obfuscation -- 1 Introduction -- 2 Background -- 2.1 Code Obfuscation -- 2.2 Code-Reuse Attack -- 3 Code-Reuse Gadgets Introduced by Obfuscation -- 3.1 Benchmark and Obfuscation Selection -- 3.2 Gadget Measurement -- 4 Study Results -- 4.1 Gadget Quantity -- 4.2 Gadget Exploitability -- 4.3 Gadget Quality -- 4.4 Code-Reuse Attack Risk -- 5 The Anatomy of the Obfuscations and Gadgets -- 5.1 Instructions Substitution -- 5.2 Control Flow Flattening -- 5.3 Bogus Control Flow -- 5.4 Virtualization -- 5.5 Just-In-Time Dynamic -- 5.6 Self-modification -- 5.7 Encode Components -- 6 Mitigation -- 6.1 Strategy -- 6.2 Evaluation -- 7 Related Work -- 8 Conclusion -- References -- ProvIoT: Detecting Stealthy Attacks in IoT through Federated Edge-Cloud Security -- 1 Introduction -- 2 Background -- 2.1 Fileless Attacks on IoT Devices -- 2.2 System Provenance and Graph Learning -- 3 Threat Model -- 4 System Overview -- 4.1 Local Brain -- 4.2 Cloud Brain -- 5 Federated Detection -- 5.1 Graph Building and Path Selection -- 5.2 Document Embedding Model -- 5.3 Federated Autoencoder -- 6 Implementation -- 7 Evaluation -- 7.1 Dataset -- 7.2 Experimental Protocol -- 7.3 IoT Malware Detection -- 7.4 APT Detection -- 7.5 Federated Learning Benefits -- 7.6 ProvIoT Overhead -- 8 Limitations -- 9 Related Work -- 10 Discussion and Future Work -- 11 Conclusion -- A Appendix -- A.1 IoT Workload. -- A.2 Dataset Statistics.
A.3 APT Scenarios -- References -- Attacks -- A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer -- 1 Introduction -- 1.1 Paper Organization -- 2 Preliminaries -- 2.1 Learning with Errors (LWE) Problem and Its Variants -- 2.2 LPR Public-Key Encryption -- 2.3 Kyber -- 2.4 Saber -- 2.5 Related Works -- 3 Our Attack Using Binary Decision Tree on the LPR-Based Schemes -- 3.1 Implementing a Parallel Plaintext Checking (PC) Oracle -- 3.2 Generic Attack Model Using PC Oracle -- 3.3 Model for Kyber and Saber -- 3.4 Comparing Our Attack with the State-of-the-Art -- 4 Realization of the Fault Model -- 4.1 Nature of the Fault in the Attack -- 4.2 Our Target Devices -- 4.3 Probabilities of Incorporating Precise Fault Using Random Rowhammer -- 5 Discussion and Future Direction -- 5.1 Shuffling and Masking: -- 5.2 Extension of Our Attack on Other PQC Schemes -- 5.3 Combining of Lattice Reduction Techniques with Our Attack -- 5.4 Possible Countermeasures -- References -- A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation -- 1 Introduction -- 2 Previous Work -- 3 Background -- 3.1 Notation -- 3.2 Kyber Algorithm -- 4 Adversary Model -- 5 Attack Description -- 5.1 Profiling Stage -- 5.2 Attack Stage -- 6 Experimental Setup -- 7 Leakage Analysis -- 7.1 Unprotected Message Encoding -- 7.2 Masked Message Encoding -- 7.3 Finding New Leakage Points -- 8 Neural Network Training -- 8.1 Trace Acquisition and Pre-processing -- 8.2 Network Architecture and Training Parameters -- 9 New Chosen Ciphertext Construction Method -- 9.1 Constructing Chosen Ciphertexts -- 9.2 Selecting Optimal Mapping -- 10 Experimental Results -- 10.1 Message Recovery Attack -- 10.2 Secret Key Recovery Attack -- 11 Countermeasures -- 12 Conclusion -- References.
Time Is Money, Friend! Timing Side-Channel Attack Against Garbled Circuit Constructions.
Record Nr. UNINA-9910842289103321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security Workshops : ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I / / edited by Martin Andreoni
Applied Cryptography and Network Security Workshops : ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I / / edited by Martin Andreoni
Autore Andreoni Martin
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (413 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer engineering
Computer networks
Computers
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Data and Information Security
Computer Engineering and Networks
Computing Milieux
Cryptology
Mobile and Network Security
Enginyeria d'ordinadors
Xarxes d'ordinadors
Protecció de dades
Criptografia
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 9783031614866
9783031614859
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto AIBlock – Application Intelligence and Blockchain Security: An End-to-End Secure Solution for IoMT Data Exchange -- EasyLog: An Effcient Kernel Logging Service for Machine Learning -- LM-cAPI:A Lite Model based on API Core Semantic Information for Malware Classification -- ACKI NACKI: a Probabilistic Proof-of-Stake consensus protocol with fast finality and parallelization. AIHWS – Artificial Intelligence in Hardware Security: FPGA Implementation of Physically Unclonable Functions based on Multi-threshold Delay Time Measurement Method to Mitigate Modeling Attacks -- Incorporating Cluster Analysis of Feature Vectors for Non-profiled Deep-learning-based Side-channel Attacks -- Creating from Noise: Trace Generations Using Diffusion Model for Side-Channel Attacks -- Diversity Algorithms for Laser Fault Injection -- One for All, All for Ascon: Ensemble-based Deep Learning Side-channel Analysis -- CNN architecture extraction on edge GPU -- Harnessing the Power of LLMs in Hardware Trojan Design -- Everything All At Once: Deep Learning Side-Channel Analysis Optimization Framework -- AIoTS – Artificial Intelligence and Industrial IoT Security: Device Fingerprinting in a Smart Grid CPS -- Power Quality Forecasting of Microgrids using Adaptive Privacy-Preserving Machine Learning -- Evaluation of Lightweight Machine Learning-based NIDS Techniques for Industrial IoT -- Measuring Cyber Resilience of IoT-enabled Critical National Infrastructure -- SCI – Secure Cryptographic Implementation: Towards Discovering Quantum-Threats for Applications using Open-Source Libraries -- Pushing AES-256-GCM to Limits: Design, Implementation and Real FPGA Tests -- Automated Generation of Masked Nonlinear Components: From Lookup Tables to Private Circuits -- A Command-Activated Hardware Trojan Detection Method Based on LU-NAR Framework -- Cross-Correlation Based Trace Segmentation for Clustering Power Analysis on Public Key Cryptosystems -- Fully Hybrid TLSv1.3 in WolfSSL on Cortex-M4.
Record Nr. UNINA-9910866573503321
Andreoni Martin  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security Workshops : ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II / / edited by Martin Andreoni
Applied Cryptography and Network Security Workshops : ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II / / edited by Martin Andreoni
Autore Andreoni Martin
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (253 pages)
Disciplina 005.8
Altri autori (Persone) Andreoni
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer engineering
Computer networks
Computers
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Data and Information Security
Computer Engineering and Networks
Computing Milieux
Cryptology
Mobile and Network Security
Enginyeria d'ordinadors
Xarxes d'ordinadors
Criptografia
Protecció de dades
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 9783031614897
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto AAC – Workshop on Advances in Asymmetric Cryptanalysis: Forging tropical signatures -- Quantum Circuit Design for the Lee-Brickell based Information Set Decoding -- Projective Space Stern Decoding and Application to SDitH. SiMLA – Security in Machine Learning and its Applications: One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection -- Model Extraction Attack without Natural Images -- Privacy-Preserving Sentiment Analysis using Homomorphic Encryption and Attention Mechanisms -- Differential Privacy with Selected Privacy Budget ϵ in a Cyber Physical System Using Machine Learning. LEE – Low-Latency Encryption: Construction of 4 × 4 Lightweight Low-latency Involutory MDS Matrices CIMSS – Critical Infrastructure and Manufacturing System Security Guidelines for Cyber Risk Management in Autonomous Shipping Identity-based Cluster Authentication and Key Exchange (ID-CAKE) Message Broadcasting and Batch Verification in VANETs. POSTERS: One Time Chat – a toy end-to-end encrypted web messaging service -- Game Theoretic Modeling of Insider Threats in An Organization -- Smart Appliance Abnormal Electrical Power Consumption Detection -- Towards Secure 5G Infrastructures for Production Systems -- Cybersecurity Awareness Education: Just as Useful for Technical Users -- Salsa20 Cipher: Assigning Values to Probabilistic Neutral Key Bits -- A Versatile and Unified HQC Hardware Accelerator -- Applying Self-Recognition Biometrics to Live Deepfake Detection in Video Conferences -- GAN and DM Generated Synthetic Image Detection in the Age of Misinformation -- Extremely Simple Fail-Stop ECDSA Signatures -- Physically Unclonable Fingerprints for Authentication.
Record Nr. UNINA-9910869161603321
Andreoni Martin  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui