Information Security

Information Security portes grátis

Information Security

26th International Conference, ISC 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings

Mennink, Bart; Athanasopoulos, Elias

Springer International Publishing AG

12/2023

598

Mole

Inglês

9783031491863

15 a 20 dias

Descrição não disponível.
Privacy: Exploring Privacy-Preserving Techniques on Synthetic Data as a Defense against Model Inversion Attacks.- Privacy-preserving Medical Data Generation using Adversarial Learning.- Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning.- Intrusion Detection and Systems: SIFAST: An Efficient Unix Shell Embedding Framework for Malicious Detection.- VNGuard: Intrusion Detection System for In-Vehicle Networks.- RLTrace: Synthesizing High-Quality System Call Traces for OS Fuzz Testing.- Machine Learning: Loss and Likelihood Based Membership Inference of Diffusion Models.- Symmetry Defense Against CNN Adversarial Perturbation Attacks.- Web Security: Load-and-Act: Increasing Page Coverage of Web Applications.- From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions.- Mobile Security and Trusted Execution: Libra : Library Identification in Obfuscated Android Apps.- Certificate reuse in Android applications.- TC4SE: A High-performance Trusted Channel Mechanism for Secure Enclave-based Trusted Execution Environments.- Post-Quantum Cryptography: Performance Impact of PQC KEMs on TLS 1.3 under Varying Network Characteristics.- Protecting Private Keys of Dilithium using Hardware Transactional Memory.- Multiparty Computation: Mercury: Constant-Round Protocols for Multi-Party Computation with Rationals.- Evolving Conditional Disclosure of Secrets.- Symmetric Cryptography: Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size.- Impossible Differential Cryptanalysis of the FBC Block Cipher.- Fregata: Faster Homomorphic Evaluation of AES via TFHE.- Key Management: Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography.- On the Privacy-preserving Infrastructure for Authenticated Key Exchange.- Hybrid Group Key Exchange with Application to Constrained Networks.- Functional and Updatable Encryption.- Dynamic Multi-Server Updatable Encryption.- Trace-and-Revoke Quadratic Functional Encryption.- Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings.- Signatures, Hashes, and Cryptanalysis: Robust Property-Preserving Hash Meets Homomorphism.- Withdrawable Signature: How to Call off a Signature.- An Improved BKW Algorithm for Solving LWE with Small Secrets.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
artificial intelligence;authentication;computer networks;computer systems;cryptography;data communication systems;data mining;data security;databases;distributed computer systems;distributed systems;encryption;engineering;network protocols;network security;parallel processing systems;public key cryptography;signal processing;software design;software engineering