Muthukkumarasamy / Shyamasundar / Sudarsan | Information Systems Security | Buch | 978-3-031-49098-9 | sack.de

Buch, Englisch, 482 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 774 g

Reihe: Lecture Notes in Computer Science

Muthukkumarasamy / Shyamasundar / Sudarsan

Information Systems Security

19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings

Buch, Englisch, 482 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 774 g

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-031-49098-9
Verlag: Springer Nature Switzerland


This book constitutes the refereed proceedings of the19th International Conference on Information Systems Security, ICISS 2023, held in Raipur, India, during December 16–20, 2023.

The 18 full papers and 10 short papers included in this book were carefully reviewed and selected from 78 submissions. They are organized in topical sections as follows: systems security, network security, security in AI/ML, privacy, cryptography, blockchains. 

Muthukkumarasamy / Shyamasundar / Sudarsan Information Systems Security jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Systems Security.- A Security Analysis of Password Managers on Android.- The Design and Application of a Unified Ontology for Cyber Security.- Big Data Forensics on Apache Kafka.- A Survey on Security Threats and Mitigation Strategies for NoSQL Databases MongoDB as a Use Case.- Theoretical Enumeration of Deployable Single-output Strong PUF Instances based on Uniformity and Uniqueness Constraints.- Network Security.- Detection and Hardening Strategies to Secure an Enterprise Network.- Attack Graph Based Security Metrics For Dynamic Networks.- An Energy-conscious surveillance scheme for intrusion detection in underwater sensor networks using Tunicate swarm optimization.- Security in AI/ML.- STN-Net: A Robust GAN-Generated Face Detector.- MDLDroid: Multimodal Deep Learning based Android Malware Detection.- A Cycle-GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks.- Secure KNN Computation On Cloud.- A Multi-Stage Multi-Modal Classification Model for DeepFakes Combining Deep Learned and Computer Vision Oriented Features.- Privacy.- Security and Privacy in Machine Learning.- Attack on the Privacy-Preserving Carpooling Service TAROT.- Democracy in Your Hands!: Practical Multi-Key Homomorphic E-Voting.- Cryptography.- Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing.- Verifiable Timed Accountable Subgroup Multi-signatures.- Verifiable Timed Accountable Subgroup Multi-signatures.- Blockchains.- Ensuring Data Security in the Context of IoT Forensics Evidence Preservation with Blockchain and Self-Sovereign Identities.- Analysis of Optimal Number of Shards using ShardEval, A Simulator for Sharded Blockchains.- SoK: Digital Signatures and Taproot Transactions in Bitcoin.- BCTPV-NIZK: Publicly-verifiable non-interactive zero-knowledge proof system from minimal blockchain assumptions.- Proof-of-Variable-Authority: A blockchain consensus mechanism for securing IoT networks.- An Efficient Two-Party ECDSA Scheme for Cryptocurrencies.- Secure Smart Grid Data Aggregation Based on Fog Computing and Blockchain Technology.- Crypto-Ransomware Detection: A Honey-file based approach using chi-square test.- PSDP: Blockchain-Based Computationally Efficient Provably Secure Data Possession.- Private and Verifiable Inter-bank Transactions and Settlements on Blockchain.


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.