Security, Privacy, and Applied Cryptography Engineering

Security, Privacy, and Applied Cryptography Engineering

14th International Conference, SPACE 2024, Kottayam, India, December 14-17, 2024, Proceedings

Forte, Domenic; Chatterjee, Urbi; Knechtel, Johann

Springer International Publishing AG

01/2025

315

Mole

9783031804076

Pré-lançamento - envio 15 a 20 dias após a sua edição

Descrição não disponível.
.- Attacks and Countermeasures for Digital Microfluidic Biochips.

.- SideLink: Exposing NVLink to Covert- and Side-Channel Attacks.

.- Faster and more Energy-Efficient Equation Solvers over GF(2).

.- Transferability of Evasion Attacks Against FHE Encrypted Inference.

.- Security Analysis of ASCON Cipher under Persistent Faults.

.- Privacy-Preserving Graph-Based Machine Learning with Fully Homomorphic Encryption for Collaborative Anti-Money Laundering.

.- CoPrIME: Complete Process Isolation using Memory Encryption.

.- Online Testing Entropy and Entropy Tests with a Two State Markov Model.

.- DLShield: A Defense Approach against Dirty Label Attacks in Heterogeneous Federated Learning.

.- Benchmarking Backdoor Attacks on Graph Convolution Neural Networks: A Comprehensive Analysis of Poisoning Techniques.

.- Spatiotemporal Intrusion Detection Systems for IoT Networks.

.- High Speed High Assurance implementations of Mutivariate Quadratic based Signatures.

.- "There's always another counter": Detecting Micro-architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting.

.- FPGA-Based Acceleration of Homomorphic Convolution with Plaintext Kernels.

.- Post-Quantum Multi-Client Conjunctive Searchable Symmetric Encryption from Isogenies.

.- BlockDoor: Blocking Backdoor Based Watermarks in Deep Neural Networks.

.- Adversarial Malware Detection.

.- ML based Improved Differential Distinguisher with High Accuracy: Application to GIFT-128 and ASCON.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Digital microfluidic biochips;Cyber-physical attacks;Covert-channel;Side-channel;Contention;Information leakage;Application fingerprinting;Moebius transform;Equation solver;Evasion attacks;Deep learning;Universal adversarial perturbation;Rowhammer;Anti-money laundering;Graph neural network;Memory encryption;Dirty label attack;Homomorphic Encryption;BFV Scheme