Books+ Search Results

Information Security Applications 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers

Title
Information Security Applications [electronic resource] : 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers / edited by Howon Kim, Jonghee Youn.
ISBN
9789819980246
Edition
1st ed. 2024.
Publication
Singapore : Springer Nature Singapore : Imprint: Springer, 2024.
Physical Description
1 online resource (XIX, 350 p.) 93 illus., 73 illus. in color.
Local Notes
Access is available to the Yale community.
Access and use
Access restricted by licensing agreement.
Summary
This book constitutes the revised selected papers from the 24th International Conference on Information Security Applications, WISA 2023, held in Jeju Island, South Korea, during August 23-25, 2023. The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: Cryptography; network and application security; privacy and management; attacks and defenses; post-quantum cryptography and quantum cryptanalysis.
Variant and related titles
Springer ENIN.
Other formats
Printed edition:
Printed edition:
Format
Books / Online
Language
English
Added to Catalog
January 17, 2024
Series
Lecture Notes in Computer Science, 14402
Lecture Notes in Computer Science, 14402
Contents
Cryptography
A New Higher Order Differential of LCB
Bloomier filters on 3-hypergraphs
Principal Component Analysis over the Boolean Circuit within TFHE Scheme
A security analysis on MQ-Sign
Network and Application Security
Research on Security Threats Using VPN in Zero Trust Environments
A Blockchain-based Mobile Crowdsensing and Its Incentive Mechanism
A New Frontier in Digital Security: Verification for NFT Image using Deep Learning-based ConvNeXt Model in Quantum Blockchain
AE-LSTM based anomaly detection system for communication over DNP 3.0
Privacy & Management
Systematic Evaluation of Robustness Against Model Inversion Attacks on Split Learning
Vulnerability Assessment Framework Based on In-the-Wild Exploitability for Prioritizing Patch Application
Patchman: Firmware Update Delivery Service Over the Blockchain for IoT Environment
Security Risk Indicator for Open Source Software to Measure Software Development Status
Attacks & Defenses
Defending AirType against Inference Attacks using 3D In-Air Keyboard Layouts: Design and Evaluation
Robust Training for Deepfake Detection Models Against Disruption Induced Data Poisoning
Multi-class Malware Detection via Deep Graph Convolutional Networks using TF-IDF-based Attributed Call Graphs
OCR meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime
Enriching Vulnerability Reports Through Automated and Augmented Description Summarization
Cryptography
Protecting Kernel Code Integrity with PMP on RISC-V
Exploiting Memory Page Management in KSM for Remote Memory Deduplication Attack
Mutation Methods for Structured Input to Enhance Path Coverage of Fuzzers
Improved Differential-Linear Cryptanalysis of Reduced Rounds of ChaCha
SP-Fuzz: Fuzzing soft PLC with Semi-automated Harness Synthesis
Post-Quantum Cryptography & Quantum Cryptanalysis
Post-Quantum Cryptography & Quantum Cryptanalysis
PQ-DPoL: An Efficient Post-Quantum Blockchain Consensus Algorithm
Efficient Implementation of the Classic McEliece on ARMv8 processors
Evaluating KpqC Algorithm Submissions: A Balanced and Clean Benchmarking Approach.
Also listed under
Kim, Howon. editor.
Youn, Jonghee. editor.
SpringerLink (Online service)
Citation

Available from:

Online
Loading holdings.
Unable to load. Retry?
Loading holdings...
Unable to load. Retry?