Katalog der Deutschen Nationalbibliothek

Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
 

Ergebnis der Suche nach: "security"



Treffer 58 von 55226 < < > <



Online Ressourcen
Link zu diesem Datensatz https://d-nb.info/138865072X
Titel Cryptology and Network Security : 24th International Conference, CANS 2025, Osaka, Japan, November 17–20, 2025, Proceedings / edited by Yongdae Kim, Atsuko Miyaji, Mehdi Tibouchi
Person(en) Kim, Yongdae (Herausgeber)
Miyaji, Atsuko (Herausgeber)
Tibouchi, Mehdi (Herausgeber)
Organisation(en) SpringerLink (Online service) (Sonstige)
Ausgabe 1st ed. 2026
Verlag Singapore : Springer Nature Singapore, Imprint: Springer
Zeitliche Einordnung Erscheinungsdatum: 2026
Umfang/Format Online-Ressource, XVI, 658 p. 136 illus., 84 illus. in color. : online resource.
Andere Ausgabe(n) Printed edition:: ISBN: 978-981-95-4433-2
Printed edition:: ISBN: 978-981-95-4435-6
Inhalt -- Post-Quantum Cryptography. -- Compressed verification for post-quantum signatures with long-term public keys. -- Generalizing Key Recovery Attacks Against NTRU with Multiple Keys and Its Application in NTRUReEncrypt. -- Strong Designated Verifier Signatures from Isogeny Assumptions. -- To extend or not to extend: Agile Masking Instructions for PQC. -- Symmetric-Key Cryptography. -- Comparing Gaston with Ascon-p: Side-Channel Analysis and Hardware Evaluation. -- Sonikku: Gotta Speed, Keed! A Family of Fast and Secure MACs. -- Computing the restricted algebraic immunity, and application to WPB functions. -- Multi-Party Computation. -- Efficient Fuzzy Labeled PSI from Vector Ring-OLE. -- Efficient Three-Input and Four-Input AND Protocols Using Playing Cards with Partial-Open Actions. -- Impossibility of Four-Card AND Protocols with a Single Closed Shuffle. -- webSPDZ: Versatile MPC on the Web. -- Advanced Encryption. -- Group Signatures with Message-Dependent Opening Directly Imply Timed Release Encryption. -- On the Relations between Matchmaking Public Key Encryption and Public Key Authenticated Encryption with Keyword Search. -- Faster FHEW Bootstrapping with Adaptive Key Update. -- Cryptographic Protocols and Blockchain. -- Attribute-based Key Exchange with Optimal Efficiency. -- Codes on any Cayley Graph have an Interactive Oracle Proof of Proximity. -- Decentralized Fair Exchange with Advertising. -- Revisiting Rational Broadcast Protocols. -- Vulnerability Detection. -- WiperSentinel: HPC based Wiper detection with Enhanced AutoEncoder. -- Attention-based Code Summarization for Multi-label Vulnerability Detection. -- Lanstree: Cross-Architecture Binary Code Similarity Detection with a Bidirec tional Tree-Structured Embedding Model. -- What Matters Most in Vulnerabilities? Key Term Extraction for CVE-to-CWE Mapping with LLMs. -- Beyond CWEs: Mapping Weaknesses in Unstructured Threat Intelligence Text. -- Attacks. -- Unveiling the critical attack path for implanting backdoors in supply chains: Practical experience from XZ. -- Synthetic Lateral Movement Data Generation for Azure Cloud: A HoppeBased Approach. -- Acoustic Side Channel Attack on Keyboards Based on Typing Patterns. -- Short Papers. -- Enhancing Cold Boot Attacks with Probabilistic-Guided SAT-Solvers. -- DiSK: A Deniable Split KEM from The MLWE Problem. -- A Key-Update Mechanism for the Space Data Link Security Protocol. -- Automated Verification of Proofs in the Universal Composability Framework with Markov Decision Processes. -- Fully Verifiable Ciphertext-Policy Attribute-Based Encryption. -- Few-Shot Retrieval-Augmented LLMs for Anomaly Detection in Network Traffic. -- Impossible Differential Attack on SAND-128.
Persistent Identifier URN: urn:nbn:de:101:1-2602010311529.855334615479
DOI: 10.1007/978-981-95-4434-9
URL https://doi.org/10.1007/978-981-95-4434-9
ISBN/Einband/Preis 978-981-95-4434-9
Sprache(n) Englisch (eng)
Beziehungen Lecture Notes in Computer Science ; 16351
DDC-Notation 005.8 (maschinell ermittelte DDC-Kurznotation)
Sachgruppe(n) 004 Informatik

Online-Zugriff Archivobjekt öffnen




Treffer 58 von 55226
< < > <


E-Mail-IconAdministration