Information and Communications Security
25th International Conference, ICICS 2023, Tianjin, China, November 18¿20, 2023, Proceedings
Herausgegeben:Wang, Ding; Yung, Moti; Liu, Zheli; Chen, Xiaofeng
Information and Communications Security
25th International Conference, ICICS 2023, Tianjin, China, November 18¿20, 2023, Proceedings
Herausgegeben:Wang, Ding; Yung, Moti; Liu, Zheli; Chen, Xiaofeng
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This volume LNCS 14252 constitutes the refereed proceedings of 25th International Conference on Information and Communications Security, ICICS 2023, held in Tianjin, China, during November 18-20, 2023.
The 38 full papers presented together with 6 short papers were carefully reviewed and selected from 181 submissions. The conference focuses on: Symmetric-Key Cryptography; Public-Key Cryptography; Applied Cryptography; Authentication and Authorization; Privacy and Anonymity; Security and Privacy of AI; Blockchain and Cryptocurrencies; and System and Network Security.
Andere Kunden interessierten sich auch für
- Information and Communications Security81,99 €
- Advances in Information and Computer Security41,99 €
- Information and Communications Security53,99 €
- Information and Communications Security53,99 €
- Provable Security41,99 €
- Information Security Applications41,99 €
- Security and Privacy81,99 €
-
-
-
This volume LNCS 14252 constitutes the refereed proceedings of 25th International Conference on Information and Communications Security, ICICS 2023, held in Tianjin, China, during November 18-20, 2023.
The 38 full papers presented together with 6 short papers were carefully reviewed and selected from 181 submissions. The conference focuses on: Symmetric-Key Cryptography; Public-Key Cryptography; Applied Cryptography; Authentication and Authorization; Privacy and Anonymity; Security and Privacy of AI; Blockchain and Cryptocurrencies; and System and Network Security.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
The 38 full papers presented together with 6 short papers were carefully reviewed and selected from 181 submissions. The conference focuses on: Symmetric-Key Cryptography; Public-Key Cryptography; Applied Cryptography; Authentication and Authorization; Privacy and Anonymity; Security and Privacy of AI; Blockchain and Cryptocurrencies; and System and Network Security.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 14252
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-99-7355-2
- 1st ed. 2023
- Seitenzahl: 792
- Erscheinungstermin: 20. Oktober 2023
- Englisch
- Abmessung: 235mm x 155mm x 43mm
- Gewicht: 1177g
- ISBN-13: 9789819973552
- ISBN-10: 9819973554
- Artikelnr.: 68949377
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes in Computer Science 14252
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-99-7355-2
- 1st ed. 2023
- Seitenzahl: 792
- Erscheinungstermin: 20. Oktober 2023
- Englisch
- Abmessung: 235mm x 155mm x 43mm
- Gewicht: 1177g
- ISBN-13: 9789819973552
- ISBN-10: 9819973554
- Artikelnr.: 68949377
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Symmetric-Key Cryptography.- SAT-aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA.- Improved Related-Key Rectangle Attack against the Full AES-192.- Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM.- Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher.- PAE: Towards More Efficient and BBB-secure AE From a Single Public Permutation.- Public-Key Cryptography.- A Polynomial-time Attack on G2SIDH.- Improvements of Homomorphic Secure Evaluation of Inverse Square Root.- Oblivious Transfer from Rerandomizable PKE.- Forward Secure Lattice-based Ring Signature Scheme in the Standard Model.- Applied Cryptography.- Secure Multi-Party Computation with Legally-Enforceable Fairness.- On-demand Allocation of Cryptographic Computing Resource with Load Prediction.- Private Message Franking with After Opening Privacy.- Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction.- Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography.- Authentication and Authorization.- PiXi: Password Inspiration by Exploring Information.- Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris Verification.- A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things.- BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks.- Privacy and Anonymity.- Link Prediction-Based Multi-Identity Recognition of Darknet Vendors.- CryptoMask: Privacy-preserving Face Recognition.- Efficient Private Multiset ID Protocols.- Zoomer: A Website Fingerprinting Attack against Tor Hidden Services.- An Enhanced Privacy-preserving Hierarchical Federated Learning Framework for IoV.- Security and Privacy of AI.- Revisiting the Deep Learning-based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors.- Multi-scale Features Destructive Universal Adversarial Perturbations.- Pixel-Wise Reconstruction of Private Data in Split Federated Learning.- Neural Network Backdoor Attacks Fully Controlled by Composite Natural Utterance Fragments.- Black-Box Fairness Testing with Shadow Models.- Graph Unlearning using Knowledge Distillation.- AFLOW: Developing Adversarial Examples under Extremely Noise-limited Settings.- Learning to Detect Deepfakes via Adaptive Attention and Constrained Difference.- A Novel Deep Ensemble Framework for Online Signature Verification Using Temporal and Spatial Representation.- Blockchain and Cryptocurrencies.- SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains.- Subsidy Bridge: Rewarding Cross-blockchain Relayers with Subsidy.- Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-based Cryptocurrency Transactions.- Blockchain based Publicly Auditable Multi-Party Computation with Cheater Detection.- BDTS: Blockchain-based Data Trading System.- Illegal Accounts Detection on Ethereum using Heterogeneous Graph Transformer Networks.- System and Network security.- DRoT: A Decentralised Root of Trust for Trusted Networks.- Finding Missing Security Operation Bugs via Program Slicing and Differential Check.- TimeClave: Oblivious In-enclave Time series Processing System.- Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios.- A Fake News Detection Method Based on A Multimodal Cooperative Attention Network.
Symmetric-Key Cryptography.- SAT-aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA.- Improved Related-Key Rectangle Attack against the Full AES-192.- Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM.- Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher.- PAE: Towards More Efficient and BBB-secure AE From a Single Public Permutation.- Public-Key Cryptography.- A Polynomial-time Attack on G2SIDH.- Improvements of Homomorphic Secure Evaluation of Inverse Square Root.- Oblivious Transfer from Rerandomizable PKE.- Forward Secure Lattice-based Ring Signature Scheme in the Standard Model.- Applied Cryptography.- Secure Multi-Party Computation with Legally-Enforceable Fairness.- On-demand Allocation of Cryptographic Computing Resource with Load Prediction.- Private Message Franking with After Opening Privacy.- Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction.- Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography.- Authentication and Authorization.- PiXi: Password Inspiration by Exploring Information.- Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris Verification.- A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things.- BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks.- Privacy and Anonymity.- Link Prediction-Based Multi-Identity Recognition of Darknet Vendors.- CryptoMask: Privacy-preserving Face Recognition.- Efficient Private Multiset ID Protocols.- Zoomer: A Website Fingerprinting Attack against Tor Hidden Services.- An Enhanced Privacy-preserving Hierarchical Federated Learning Framework for IoV.- Security and Privacy of AI.- Revisiting the Deep Learning-based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors.- Multi-scale Features Destructive Universal Adversarial Perturbations.- Pixel-Wise Reconstruction of Private Data in Split Federated Learning.- Neural Network Backdoor Attacks Fully Controlled by Composite Natural Utterance Fragments.- Black-Box Fairness Testing with Shadow Models.- Graph Unlearning using Knowledge Distillation.- AFLOW: Developing Adversarial Examples under Extremely Noise-limited Settings.- Learning to Detect Deepfakes via Adaptive Attention and Constrained Difference.- A Novel Deep Ensemble Framework for Online Signature Verification Using Temporal and Spatial Representation.- Blockchain and Cryptocurrencies.- SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains.- Subsidy Bridge: Rewarding Cross-blockchain Relayers with Subsidy.- Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-based Cryptocurrency Transactions.- Blockchain based Publicly Auditable Multi-Party Computation with Cheater Detection.- BDTS: Blockchain-based Data Trading System.- Illegal Accounts Detection on Ethereum using Heterogeneous Graph Transformer Networks.- System and Network security.- DRoT: A Decentralised Root of Trust for Trusted Networks.- Finding Missing Security Operation Bugs via Program Slicing and Differential Check.- TimeClave: Oblivious In-enclave Time series Processing System.- Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios.- A Fake News Detection Method Based on A Multimodal Cooperative Attention Network.