Katalog der Deutschen Nationalbibliothek
Ergebnis der Suche nach: "Image"
|
|
|
| Link zu diesem Datensatz | https://d-nb.info/1389614999 |
| Titel | Security, Privacy, and Applied Cryptography Engineering : 15th International Conference, SPACE 2025, Guwahati, India, December 16–19, 2025, Proceedings / edited by Chandan Karfa, Navid Asadi, Anupam Chattopadhyay |
| Person(en) |
Karfa, Chandan (Herausgeber) Asadi, Navid (Herausgeber) Chattopadhyay, Anupam (Herausgeber) |
| Organisation(en) | SpringerLink (Online service) (Sonstige) |
| Ausgabe | 1st ed. 2026 |
| Verlag | Cham : Springer Nature Switzerland, Imprint: Springer |
| Zeitliche Einordnung | Erscheinungsdatum: 2026 |
| Umfang/Format | Online-Ressource, XI, 432 p. 112 illus., 91 illus. in color. : online resource. |
| Andere Ausgabe(n) |
Printed edition:: ISBN: 978-3-032-16341-7 Printed edition:: ISBN: 978-3-032-16343-1 |
| Inhalt | -- A Custom Entropy Harvester for Consistent Entropy Supply to the /dev/random. -- Efficient Time Share Masking of AES. -- Investigation on the Impact of Practical Fault Model for Commercial Edge Machine Learning Devices. -- A new perspective on the decomposition in the Jacobian of small genus hyperelliptic curve. -- A Multi-View Contrastive Graph Neural Network Framework for Malware Detection in IoMT environments. -- PAC-Guided Design Strategies for Resilient Priority Arbiter PUFs. -- Toward Crypto Agility: Automated Analysis of Quantum-Vulnerable TLS via Packet Inspection. -- GhostWriter: Exploiting GPU-Cache Contention to Steal and Steer Multi-Tenant Large-Language-Model Inference. -- Breaking PCB-Chain: A Side Channel Assisted Attack on IoT-Friendly Blockchain Mining. -- Analyzing Non-linear Shift Register Transformations in the Design and Cryptanalysis of Espresso. -- Sample Similarity based Incremental Clustering: An Effective Methodology for Anomaly Detection in Networks . -- Addressing Cache Side-Channel Attacks using Taint-guidedFine-grained Computation Offloading in Near-Memory Processing. -- Gradient-Guided Adversarial Patch Attack for Deep Neural Networks. -- High throughput 64-bit implementation of SNOW-V stream cipher. -- A Security Analysis of CNN Partitioning Strategies for Distributed Inference at the Edge. -- MLP is better than ResNet on ANSSI’s Protected AES Implementation on ARM. -- VulScan-LT: A Lightweight Transformer-based Software VulnerabilityScanning Tool for Resource-Constrained Edge Devices. -- Enhanced Hardware Trojan Detection with XGBoost Graph Learning:A Glass Box Approach. -- Hard-to-Find Bugs in Public-Key Cryptographic Software:Classification and Test Methodologies. -- Secure Secret Sharing Protocol Against Network Data Remanence Side Channel Attacks. -- Quantum Synthesis of Large S-Boxes: Heuristic and MILP-Based Transpiled-Depth Optimization. -- A keystream generator inspired by the experiment of drawing balls with replacement |
| Persistent Identifier |
URN: urn:nbn:de:101:1-2602120308529.622698095682 DOI: 10.1007/978-3-032-16342-4 |
| URL | https://doi.org/10.1007/978-3-032-16342-4 |
| ISBN/Einband/Preis | 978-3-032-16342-4 |
| Sprache(n) | Englisch (eng) |
| Beziehungen | Lecture Notes in Computer Science ; 16406 |
| DDC-Notation | 005.8 (maschinell ermittelte DDC-Kurznotation) |
| Sachgruppe(n) | 004 Informatik |
| Online-Zugriff | Archivobjekt öffnen |

