Foundations and Practice of Security: 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12–14, 2022, Revised Selected Papers: Lecture Notes in Computer Science, cartea 13877
Editat de Guy-Vincent Jourdan, Laurent Mounier, Carlisle Adams, Florence Sèdes, Joaquin Garcia-Alfaroen Limba Engleză Paperback – apr 2023
The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers.
Din seria Lecture Notes in Computer Science
- 20%
Preț: 426.75 lei - 20%
Preț: 315.62 lei - 20%
Preț: 320.92 lei - 15%
Preț: 426.53 lei - 20%
Preț: 313.87 lei - 20%
Preț: 355.79 lei - 20%
Preț: 355.54 lei - 20%
Preț: 355.18 lei - 20%
Preț: 390.68 lei - 20%
Preț: 392.03 lei - 20%
Preț: 498.95 lei - 20%
Preț: 390.79 lei - 20%
Preț: 495.44 lei - 20%
Preț: 498.80 lei - 20%
Preț: 498.50 lei - 20%
Preț: 355.93 lei - 20%
Preț: 639.52 lei - 20%
Preț: 499.90 lei - 20%
Preț: 498.95 lei - 20%
Preț: 270.68 lei - 20%
Preț: 321.68 lei - 20%
Preț: 391.36 lei - 20%
Preț: 322.09 lei - 20%
Preț: 498.90 lei - 20%
Preț: 312.82 lei - 20%
Preț: 496.73 lei - 20%
Preț: 463.03 lei - 20%
Preț: 531.75 lei - 15%
Preț: 496.40 lei - 20%
Preț: 497.25 lei - 20%
Preț: 498.80 lei - 20%
Preț: 461.86 lei - 20%
Preț: 355.59 lei - 20%
Preț: 324.19 lei -
Preț: 418.19 lei - 20%
Preț: 498.59 lei - 20%
Preț: 391.28 lei - 20%
Preț: 355.69 lei - 15%
Preț: 499.72 lei - 20%
Preț: 499.40 lei - 20%
Preț: 390.42 lei - 20%
Preț: 497.75 lei - 20%
Preț: 326.81 lei - 20%
Preț: 322.32 lei - 20%
Preț: 390.42 lei - 20%
Preț: 458.84 lei - 20%
Preț: 427.09 lei - 20%
Preț: 499.90 lei - 20%
Preț: 320.72 lei
Preț: 520.33 lei
Preț vechi: 650.42 lei
-20% Nou
Puncte Express: 780
Preț estimativ în valută:
92.08€ • 107.38$ • 80.84£
92.08€ • 107.38$ • 80.84£
Carte tipărită la comandă
Livrare economică 15-29 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783031301216
ISBN-10: 3031301218
Pagini: 474
Ilustrații: XIII, 474 p. 133 illus., 98 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.68 kg
Ediția:1st ed. 2023
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3031301218
Pagini: 474
Ilustrații: XIII, 474 p. 133 illus., 98 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.68 kg
Ediția:1st ed. 2023
Editura: Springer Nature Switzerland
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Cuprins
Cryptography.- Security Analysis of Improved EDHOC Protocol.- A Survey on Identity-based Blind Signature.- Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES.- Post-Quantum and UC-secure Oblivious Transfer from SPHF with Grey Zone.- A New Class of Trapdoor Verifiable Delay Functions.- Practical homomorphic evaluation of block-cipher-based hash functions with applications.- Towards a maturity model for crypto-agility assessment.- Machine Learning.- Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher.- Data-driven Evaluation of Intrusion Detectors : a Methodological Framework.- CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter.- Cybercrime and Privacy.- Where is The Python Interpreter?.- Automating Device Fingerprinting Attacks in 4G and5G NSA Mobile Networks.- Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms.- A Taxonomy and Gap-analysis in Digital Privacy Education.- Differentially Private Friends Recommendation.- Physical-layer Security.- Underwater Confidential Communications in JANUS.- Defense Models for Data Recovery in Industrial Control Systems.- SCADA Radio Blackbox Reverse Engineering.- Blockchain.- Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts.- Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts.- Money Transfer on Transaction Signature-based Ledger.- A Decentralized Mnemonic Backup System for Non-Custodial Cryptocurrency Wallets.- IoT and Security Protocols.- If-This-Then-Allow-That (to Phone Home): A Trigger-Based NetworkPolicy Enforcement Framework for Smart Homes.- Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords.- Towards Characterizing IoT Software Update Practices.- Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic.- Short Papers.- A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection.- Deep-Learning-Based Vulnerability Detection in Binary Executables.- Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis.