Katalog der Deutschen Nationalbibliothek

Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
 

Ergebnis der Suche nach: "Image"



Treffer 207 von 142209 < < > <



Online Ressourcen
Link zu diesem Datensatz https://d-nb.info/1389614999
Titel Security, Privacy, and Applied Cryptography Engineering : 15th International Conference, SPACE 2025, Guwahati, India, December 16–19, 2025, Proceedings / edited by Chandan Karfa, Navid Asadi, Anupam Chattopadhyay
Person(en) Karfa, Chandan (Herausgeber)
Asadi, Navid (Herausgeber)
Chattopadhyay, Anupam (Herausgeber)
Organisation(en) SpringerLink (Online service) (Sonstige)
Ausgabe 1st ed. 2026
Verlag Cham : Springer Nature Switzerland, Imprint: Springer
Zeitliche Einordnung Erscheinungsdatum: 2026
Umfang/Format Online-Ressource, XI, 432 p. 112 illus., 91 illus. in color. : online resource.
Andere Ausgabe(n) Printed edition:: ISBN: 978-3-032-16341-7
Printed edition:: ISBN: 978-3-032-16343-1
Inhalt -- A Custom Entropy Harvester for Consistent Entropy Supply to the /dev/random. -- Efficient Time Share Masking of AES. -- Investigation on the Impact of Practical Fault Model for Commercial Edge Machine Learning Devices. -- A new perspective on the decomposition in the Jacobian of small genus hyperelliptic curve. -- A Multi-View Contrastive Graph Neural Network Framework for Malware Detection in IoMT environments. -- PAC-Guided Design Strategies for Resilient Priority Arbiter PUFs. -- Toward Crypto Agility: Automated Analysis of Quantum-Vulnerable TLS via Packet Inspection. -- GhostWriter: Exploiting GPU-Cache Contention to Steal and Steer Multi-Tenant Large-Language-Model Inference. -- Breaking PCB-Chain: A Side Channel Assisted Attack on IoT-Friendly Blockchain Mining. -- Analyzing Non-linear Shift Register Transformations in the Design and Cryptanalysis of Espresso. -- Sample Similarity based Incremental Clustering: An Effective Methodology for Anomaly Detection in Networks . -- Addressing Cache Side-Channel Attacks using Taint-guidedFine-grained Computation Offloading in Near-Memory Processing. -- Gradient-Guided Adversarial Patch Attack for Deep Neural Networks. -- High throughput 64-bit implementation of SNOW-V stream cipher. -- A Security Analysis of CNN Partitioning Strategies for Distributed Inference at the Edge. -- MLP is better than ResNet on ANSSI’s Protected AES Implementation on ARM. -- VulScan-LT: A Lightweight Transformer-based Software VulnerabilityScanning Tool for Resource-Constrained Edge Devices. -- Enhanced Hardware Trojan Detection with XGBoost Graph Learning:A Glass Box Approach. -- Hard-to-Find Bugs in Public-Key Cryptographic Software:Classification and Test Methodologies. -- Secure Secret Sharing Protocol Against Network Data Remanence Side Channel Attacks. -- Quantum Synthesis of Large S-Boxes: Heuristic and MILP-Based Transpiled-Depth Optimization. -- A keystream generator inspired by the experiment of drawing balls with replacement
Persistent Identifier URN: urn:nbn:de:101:1-2602120308529.622698095682
DOI: 10.1007/978-3-032-16342-4
URL https://doi.org/10.1007/978-3-032-16342-4
ISBN/Einband/Preis 978-3-032-16342-4
Sprache(n) Englisch (eng)
Beziehungen Lecture Notes in Computer Science ; 16406
DDC-Notation 005.8 (maschinell ermittelte DDC-Kurznotation)
Sachgruppe(n) 004 Informatik

Online-Zugriff Archivobjekt öffnen




Treffer 207 von 142209
< < > <


E-Mail-IconAdministration