Foundations and Practice of Security
15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12¿14, 2022, Revised Selected Papers
Herausgegeben:Jourdan, Guy-Vincent; Mounier, Laurent; Adams, Carlisle; Sèdes, Florence; Garcia-Alfaro, Joaquin
Foundations and Practice of Security
15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12¿14, 2022, Revised Selected Papers
Herausgegeben:Jourdan, Guy-Vincent; Mounier, Laurent; Adams, Carlisle; Sèdes, Florence; Garcia-Alfaro, Joaquin
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the 15th International Symposium on Foundations and Practice of Security, FPS 2022, held in Ottawa, ON, Canada, during December 12-14, 2022. The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers.
Andere Kunden interessierten sich auch für
- Foundations and Practice of Security57,99 €
- Foundations and Practice of Security39,99 €
- Foundations and Practice of Security47,99 €
- Decision and Game Theory for Security57,99 €
- Foundations and Practice of Security39,99 €
- Information Security Practice and Experience51,99 €
- Information Security Practice and Experience70,99 €
-
-
-
This book constitutes the refereed proceedings of the 15th International Symposium on Foundations and Practice of Security, FPS 2022, held in Ottawa, ON, Canada, during December 12-14, 2022.
The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers.
The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 13877
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-30121-6
- 1st ed. 2023
- Seitenzahl: 488
- Erscheinungstermin: 1. April 2023
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 733g
- ISBN-13: 9783031301216
- ISBN-10: 3031301218
- Artikelnr.: 67542147
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes in Computer Science 13877
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-30121-6
- 1st ed. 2023
- Seitenzahl: 488
- Erscheinungstermin: 1. April 2023
- Englisch
- Abmessung: 235mm x 155mm x 27mm
- Gewicht: 733g
- ISBN-13: 9783031301216
- ISBN-10: 3031301218
- Artikelnr.: 67542147
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Cryptography.- Security Analysis of Improved EDHOC Protocol.- A Survey on Identity-based Blind Signature.- Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES.- Post-Quantum and UC-secure Oblivious Transfer from SPHF with Grey Zone.- A New Class of Trapdoor Verifiable Delay Functions.- Practical homomorphic evaluation of block-cipher-based hash functions with applications.- Towards a maturity model for crypto-agility assessment.- Machine Learning.- Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher.- Data-driven Evaluation of Intrusion Detectors : a Methodological Framework.- CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter.- Cybercrime and Privacy.- Where is The Python Interpreter?.- Automating Device Fingerprinting Attacks in 4G and5G NSA Mobile Networks.- Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms.- A Taxonomy and Gap-analysis in Digital Privacy Education.- Differentially Private Friends Recommendation.- Physical-layer Security.- Underwater Confidential Communications in JANUS.- Defense Models for Data Recovery in Industrial Control Systems.- SCADA Radio Blackbox Reverse Engineering.- Blockchain.- Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts.- Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts.- Money Transfer on Transaction Signature-based Ledger.- A Decentralized Mnemonic Backup System for Non-Custodial Cryptocurrency Wallets.- IoT and Security Protocols.- If-This-Then-Allow-That (to Phone Home): A Trigger-Based NetworkPolicy Enforcement Framework for Smart Homes.- Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords.- Towards Characterizing IoT Software Update Practices.- Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic.- Short Papers.- A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection.- Deep-Learning-Based Vulnerability Detection in Binary Executables.- Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis.
Cryptography.- Security Analysis of Improved EDHOC Protocol.- A Survey on Identity-based Blind Signature.- Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES.- Post-Quantum and UC-secure Oblivious Transfer from SPHF with Grey Zone.- A New Class of Trapdoor Verifiable Delay Functions.- Practical homomorphic evaluation of block-cipher-based hash functions with applications.- Towards a maturity model for crypto-agility assessment.- Machine Learning.- Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher.- Data-driven Evaluation of Intrusion Detectors : a Methodological Framework.- CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter.- Cybercrime and Privacy.- Where is The Python Interpreter?.- Automating Device Fingerprinting Attacks in 4G and5G NSA Mobile Networks.- Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms.- A Taxonomy and Gap-analysis in Digital Privacy Education.- Differentially Private Friends Recommendation.- Physical-layer Security.- Underwater Confidential Communications in JANUS.- Defense Models for Data Recovery in Industrial Control Systems.- SCADA Radio Blackbox Reverse Engineering.- Blockchain.- Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts.- Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts.- Money Transfer on Transaction Signature-based Ledger.- A Decentralized Mnemonic Backup System for Non-Custodial Cryptocurrency Wallets.- IoT and Security Protocols.- If-This-Then-Allow-That (to Phone Home): A Trigger-Based NetworkPolicy Enforcement Framework for Smart Homes.- Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords.- Towards Characterizing IoT Software Update Practices.- Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic.- Short Papers.- A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection.- Deep-Learning-Based Vulnerability Detection in Binary Executables.- Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis.