Duan / Debbabi / Au | Security and Privacy in Communication Networks | Buch | 978-3-031-64947-9 | sack.de

Buch, Englisch, Band 567, 535 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 832 g

Reihe: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

Duan / Debbabi / Au

Security and Privacy in Communication Networks

19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I
2024
ISBN: 978-3-031-64947-9
Verlag: Springer Nature Switzerland

19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I

Buch, Englisch, Band 567, 535 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 832 g

Reihe: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

ISBN: 978-3-031-64947-9
Verlag: Springer Nature Switzerland


This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China.

The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows:  

Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security.

Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security.

Duan / Debbabi / Au Security and Privacy in Communication Networks jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


AI for Security.- Classify Me Correctly if You Can Evaluating Adversarial Machine Learning Threats in NIDS.- CUFT Cuflow based Approach with Multi headed Attention Mechanism for Encrypted Traffic Classification.- CyberEA An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph.- DNN Architecture Attacks via Network and Power Side Channels.- Invisibility Spell Adversarial Patch Attack Against Object Detectors.- Meta Perturbation Generation Network for Text based CAPTCHA.- Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks.- Unsupervised Multi Criteria Adversarial Detection in Deep Image Retrieval.- VRC GraphNet A Graph Neural Network based Reasoning Framework for Attacking Visual Reasoning Captchas.- Authentication.- An Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density.- Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home.- Optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller.- Blockchain and Distributed System Security.- Byzantine Protocols with Asymptotically Optimal Communication Complexity.- Demystifying Blockchain Scalability Sibling Chains with Minimal Interleaving.- VDABSys A novel security testing framework for blockchain systems based on vulnerability detection. Cryptography.- Anonymous Key Issuing Protocol with Certified Identities in Identity based Encryption.- Batch Lattice Based Designated Verifier ZK SNARKs for R1CS.- Certificateless Aggregate Signature Without Trapdoor for Cloud Storage.- Efficient Zero Knowledge for Regular Language.- Enabling Fast Settlement in Atomic Cross-Chain Swaps.- HeSUN Homomorphic Encryption for Secure Unbounded Neural Network Inference.- Optimization of Functional Bootstraps with Large LUT and Packing Key Switching.- Data Security.- An Authentication Algorithm for Sets of Spatial Data Objects.- An Efficient Private Information Retrieval Protocol Based on TFHE.- mShield Protect In-process Sensitive Data Against Vulnerable Third Party Libraries.- Password Cracking by Exploiting User Group Information.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.