Katalog der Deutschen Nationalbibliothek
Ergebnis der Suche nach: tit all "Network Security"
|
|
|
| Link zu diesem Datensatz | https://d-nb.info/1334836639 |
| Titel | Applied Cryptography and Network Security Workshops : ACNS 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II / edited by Martin Andreoni |
| Person(en) | Andreoni, Martin (Herausgeber) |
| Organisation(en) | SpringerLink (Online service) (Sonstige) |
| Ausgabe | 1st ed. 2024 |
| Verlag | Cham : Springer Nature Switzerland, Imprint: Springer |
| Zeitliche Einordnung | Erscheinungsdatum: 2024 |
| Umfang/Format | Online-Ressource, XXI, 243 p. 50 illus., 40 illus. in color. : online resource. |
| Andere Ausgabe(n) |
Printed edition:: ISBN: 978-3-031-61488-0 Printed edition:: ISBN: 978-3-031-61490-3 |
| Inhalt | AAC – Workshop on Advances in Asymmetric Cryptanalysis: Forging tropical signatures -- Quantum Circuit Design for the Lee-Brickell based Information Set Decoding -- Projective Space Stern Decoding and Application to SDitH. SiMLA – Security in Machine Learning and its Applications: One Class to Test Them All: One-Class Classifier-Based ADS-B Location Spoofing Detection -- Model Extraction Attack without Natural Images -- Privacy-Preserving Sentiment Analysis using Homomorphic Encryption and Attention Mechanisms -- Differential Privacy with Selected Privacy Budget ϵ in a Cyber Physical System Using Machine Learning. LEE – Low-Latency Encryption: Construction of 4 × 4 Lightweight Low-latency Involutory MDS Matrices CIMSS – Critical Infrastructure and Manufacturing System Security Guidelines for Cyber Risk Management in Autonomous Shipping Identity-based Cluster Authentication and Key Exchange (ID-CAKE) Message Broadcasting and Batch Verification in VANETs. POSTERS: One Time Chat – a toy end-to-end encrypted web messaging service -- Game Theoretic Modeling of Insider Threats in An Organization -- Smart Appliance Abnormal Electrical Power Consumption Detection -- Towards Secure 5G Infrastructures for Production Systems -- Cybersecurity Awareness Education: Just as Useful for Technical Users -- Salsa20 Cipher: Assigning Values to Probabilistic Neutral Key Bits -- A Versatile and Unified HQC Hardware Accelerator -- Applying Self-Recognition Biometrics to Live Deepfake Detection in Video Conferences -- GAN and DM Generated Synthetic Image Detection in the Age of Misinformation -- Extremely Simple Fail-Stop ECDSA Signatures -- Physically Unclonable Fingerprints for Authentication |
| Persistent Identifier |
URN: urn:nbn:de:101:1-2407040444269.254874209491 DOI: 10.1007/978-3-031-61489-7 |
| URL | https://doi.org/10.1007/978-3-031-61489-7 |
| ISBN/Einband/Preis | 978-3-031-61489-7 |
| Sprache(n) | Englisch (eng) |
| Beziehungen | Lecture Notes in Computer Science ; 14587 |
| DDC-Notation | 005.8 (maschinell ermittelte DDC-Kurznotation) |
| Sachgruppe(n) | 004 Informatik |
| Online-Zugriff | Archivobjekt öffnen |

