Zhou / Rahman / Batina | Applied Cryptography and Network Security Workshops | Buch | 978-3-031-41180-9 | sack.de

Buch, Englisch, 729 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1107 g

Reihe: Lecture Notes in Computer Science

Zhou / Rahman / Batina

Applied Cryptography and Network Security Workshops

ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings

Buch, Englisch, 729 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1107 g

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-031-41180-9
Verlag: Springer Nature Switzerland


This book constitutes the proceedings of the satellite workshops held around the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023.

The 34 full papers and 13 poster papers presented in this volume were carefully reviewed and selected from 76 submissions. They stem from the following workshops:

·  1st ACNS Workshop on Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis (ADSC 2023) ·        5th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2023) ·        4th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2023) ·        5th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2023) ·        3rd ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2023) ·        5th ACNS Workshop on Cloud Security and Privacy (Cloud S&P 2023) ·        4th ACNS Workshop on Secure Cryptographic Implementation (SCI 2023) ·        4th ACNS Workshop on Security in Mobile Technologies (SecMT 2023) ·        5th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2023)
Zhou / Rahman / Batina Applied Cryptography and Network Security Workshops jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


ADSC – Automated Methods and Data-driven Techniques inSymmetric-key Cryptanalysis.- Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis.- Comprehensive Preimage Security Evaluations on Rijndael-based Hashing .- Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak.- AIBlock – Application Intelligence and Blockchain SecuritySmart Contract-based E-Voting System Using Homomorphic Encryptionand Zero-knowledge Proof.- Preventing Content Cloning in NFT Collections.- NFT Trades in Bitcoin with Off-chain Receipts.- AIHWS – Artificial Intelligence in Hardware SecurityA Comparison of Multi-task learning and Single-task learning Approaches.- Hide and Seek: Using Occlusion Techniques for Side-Channel Leakage Attribution in CNNs.- Secret Key Recovery Attack on Masked and Shuffed Implementations ofCRYSTALS-Kyber and Saber.- SoK: Assisted Fault Simulation Existing Challenges and OpportunitiesOffered by AI.- Using Model Optimization as Countermeasure against Model RecoveryAttacks.- AIoTS – Artificial Intelligence and Industrial IoT Security.- Blockchain-enabled Data Sharing in Connected Autonomous Vehicles forHeterogeneous Networks.- A Security Policy Engine for Building Energy Management Systems.- EARIC: Exploiting ADC Registers in IoT and Control Systems.- CIMSS – Critical Infrastructure and Manufacturing System SecurityRound-Effcient Security Authentication Protocol for 5G Network.- A Framework for TLS Implementation Vulnerability Testing in 5G.- Safety Watermark: A Defense Tool for Real-Time Digital Forensic IncidentResponse in Industrial Control Systems.- Leveraging Semantic Relationships to Prioritise Indicators of Compromisein Additive Manufacturing Systems.- WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISM.- Cloud S&P – Cloud Security and PrivacyslytHErin: An Agile Framework for Encrypted Deep Neural Network Inference.- Trust Management Framework for Containerized Workloads – Applications to 5G Networks.- SCI – Secure Cryptographic Implementation.- cPSIR: Circuit-based Private Stateful Information Retrieval for PrivateMedia Consumption.- A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers.- Effcient Arithmetic for Polynomial Multiplication in Post-Quantum Lattice-based Cryptosystem on RISC-V Platform.- Generic Constructions of Server-Aided Revocable ABE with VerifiableTransformation.- Hybrid Post-Quantum Signatures in Hardware Security Keys.- Multi-Armed SPHINCS+.- SpanL: Creating Algorithms for Automatic API Misuse Detection withProgram Analysis Compositions.- ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function withProver-secret.- SecMT – Security in Mobile Technologies.- If you’re scanning this, it’s too late! A QR Code-based Fuzzing Methodology to Identify Input Vulnerabilities In Mobile Apps.- Enabling Lightweight Privilege Separation in Applications withMicroGuards.- SiMLA – Security in Machine Learning and its Applications.- Eliminating Adversarial Perturbations Using Image-to-Image TranslationMethod.- Federated Learning Approach for Distributed Ransomware Analysis.- Forensic Identification of Android Trojans Using Stacked Ensemble of DeepNeural Networks.- POSTERS.- Ransomware detection mechanism – Project status at the beginning of 2023.- AuthZit: Multi-Modal Authentication with Visual-Spatial andText Secrets.- Integration of End-to-End Security and Lightweight-SSL forEnhancing Security and Effciency of MQTT.- Stopping Run-time Countermeasures in CryptographicPrimitives.- Swarm-based IoT Network Penetration Testing by IoT Devices.- Advancing Federated Edge Computing with Continual Learningfor Secure and Effcient Performance.- A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses.- Integrating Quantum Key Distribution into Hybrid Quantum-Classical Networks.- Adaptive Moving Target Defense: Enhancing Dynamic Perturbation through Voltage Sensitivity Analysis in Power Systems.- PriAuct: Privacy Preserving Auction Mechanism.- Using Verifiable Credentials for Authentication of UAVs in Logistics.- A card-based protocol that lets you know how close two partiesare in their opinions (agree/disagree) by using a four-point Likert scale.- Collaborative Authority-Based Searchable Encryption UsingAccess Control Encryption.


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.