Security and Privacy in Communication Networks
19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I
Herausgegeben:Duan, Haixin; Debbabi, Mourad; de Carné de Carnavalet, Xavier; Luo, Xiapu; Du, Xiaojiang; Au, Man Ho Allen
Security and Privacy in Communication Networks
19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I
Herausgegeben:Duan, Haixin; Debbabi, Mourad; de Carné de Carnavalet, Xavier; Luo, Xiapu; Du, Xiaojiang; Au, Man Ho Allen
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China.
The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows:
Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security.
Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security. …mehr
Andere Kunden interessierten sich auch für
- Security and Privacy in Communication Networks73,99 €
- Network and System Security69,99 €
- Information Security Practice and Experience73,99 €
- Computer Security41,99 €
- Security and Privacy in Communication Networks81,99 €
- Security and Privacy in Communication Networks41,99 €
- Security and Privacy in Communication Networks42,99 €
-
-
-
This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China.
The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows:
Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security.
Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security.
The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows:
Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security.
Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security.
Produktdetails
- Produktdetails
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-64947-9
- Seitenzahl: 556
- Erscheinungstermin: 13. Oktober 2024
- Englisch
- Abmessung: 235mm x 155mm x 30mm
- Gewicht: 832g
- ISBN-13: 9783031649479
- ISBN-10: 3031649478
- Artikelnr.: 70837718
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee
- Verlag: Springer / Springer Nature Switzerland / Springer, Berlin
- Artikelnr. des Verlages: 978-3-031-64947-9
- Seitenzahl: 556
- Erscheinungstermin: 13. Oktober 2024
- Englisch
- Abmessung: 235mm x 155mm x 30mm
- Gewicht: 832g
- ISBN-13: 9783031649479
- ISBN-10: 3031649478
- Artikelnr.: 70837718
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
AI for Security.- Classify Me Correctly if You Can Evaluating Adversarial Machine Learning Threats in NIDS.- CUFT Cuflow based Approach with Multi headed Attention Mechanism for Encrypted Traffic Classification.- CyberEA An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph.- DNN Architecture Attacks via Network and Power Side Channels.- Invisibility Spell Adversarial Patch Attack Against Object Detectors.- Meta Perturbation Generation Network for Text based CAPTCHA.- Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks.- Unsupervised Multi Criteria Adversarial Detection in Deep Image Retrieval.- VRC GraphNet A Graph Neural Network based Reasoning Framework for Attacking Visual Reasoning Captchas.- Authentication.- An Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density.- Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home.- Optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller.- Blockchain and Distributed System Security.- Byzantine Protocols with Asymptotically Optimal Communication Complexity.- Demystifying Blockchain Scalability Sibling Chains with Minimal Interleaving.- VDABSys A novel security testing framework for blockchain systems based on vulnerability detection. Cryptography.- Anonymous Key Issuing Protocol with Certified Identities in Identity based Encryption.- Batch Lattice Based Designated Verifier ZK SNARKs for R1CS.- Certificateless Aggregate Signature Without Trapdoor for Cloud Storage.- Efficient Zero Knowledge for Regular Language.- Enabling Fast Settlement in Atomic Cross-Chain Swaps.- HeSUN Homomorphic Encryption for Secure Unbounded Neural Network Inference.- Optimization of Functional Bootstraps with Large LUT and Packing Key Switching.- Data Security.- An Authentication Algorithm for Sets of Spatial Data Objects.- An Efficient Private Information Retrieval Protocol Based on TFHE.- mShield Protect In-process Sensitive Data Against Vulnerable Third Party Libraries.- Password Cracking by Exploiting User Group Information.
AI for Security.- Classify Me Correctly if You Can Evaluating Adversarial Machine Learning Threats in NIDS.- CUFT Cuflow based Approach with Multi headed Attention Mechanism for Encrypted Traffic Classification.- CyberEA An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph.- DNN Architecture Attacks via Network and Power Side Channels.- Invisibility Spell Adversarial Patch Attack Against Object Detectors.- Meta Perturbation Generation Network for Text based CAPTCHA.- Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks.- Unsupervised Multi Criteria Adversarial Detection in Deep Image Retrieval.- VRC GraphNet A Graph Neural Network based Reasoning Framework for Attacking Visual Reasoning Captchas.- Authentication.- An Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density.- Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home.- Optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller.- Blockchain and Distributed System Security.- Byzantine Protocols with Asymptotically Optimal Communication Complexity.- Demystifying Blockchain Scalability Sibling Chains with Minimal Interleaving.- VDABSys A novel security testing framework for blockchain systems based on vulnerability detection. Cryptography.- Anonymous Key Issuing Protocol with Certified Identities in Identity based Encryption.- Batch Lattice Based Designated Verifier ZK SNARKs for R1CS.- Certificateless Aggregate Signature Without Trapdoor for Cloud Storage.- Efficient Zero Knowledge for Regular Language.- Enabling Fast Settlement in Atomic Cross-Chain Swaps.- HeSUN Homomorphic Encryption for Secure Unbounded Neural Network Inference.- Optimization of Functional Bootstraps with Large LUT and Packing Key Switching.- Data Security.- An Authentication Algorithm for Sets of Spatial Data Objects.- An Efficient Private Information Retrieval Protocol Based on TFHE.- mShield Protect In-process Sensitive Data Against Vulnerable Third Party Libraries.- Password Cracking by Exploiting User Group Information.