Buch, Englisch, 729 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1107 g
ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings
Buch, Englisch, 729 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 1107 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-031-41180-9
Verlag: Springer Nature Switzerland
The 34 full papers and 13 poster papers presented in this volume were carefully reviewed and selected from 76 submissions. They stem from the following workshops:
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
Weitere Infos & Material
ADSC – Automated Methods and Data-driven Techniques inSymmetric-key Cryptanalysis.- Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis.- Comprehensive Preimage Security Evaluations on Rijndael-based Hashing .- Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak.- AIBlock – Application Intelligence and Blockchain SecuritySmart Contract-based E-Voting System Using Homomorphic Encryptionand Zero-knowledge Proof.- Preventing Content Cloning in NFT Collections.- NFT Trades in Bitcoin with Off-chain Receipts.- AIHWS – Artificial Intelligence in Hardware SecurityA Comparison of Multi-task learning and Single-task learning Approaches.- Hide and Seek: Using Occlusion Techniques for Side-Channel Leakage Attribution in CNNs.- Secret Key Recovery Attack on Masked and Shuffed Implementations ofCRYSTALS-Kyber and Saber.- SoK: Assisted Fault Simulation Existing Challenges and OpportunitiesOffered by AI.- Using Model Optimization as Countermeasure against Model RecoveryAttacks.- AIoTS – Artificial Intelligence and Industrial IoT Security.- Blockchain-enabled Data Sharing in Connected Autonomous Vehicles forHeterogeneous Networks.- A Security Policy Engine for Building Energy Management Systems.- EARIC: Exploiting ADC Registers in IoT and Control Systems.- CIMSS – Critical Infrastructure and Manufacturing System SecurityRound-Effcient Security Authentication Protocol for 5G Network.- A Framework for TLS Implementation Vulnerability Testing in 5G.- Safety Watermark: A Defense Tool for Real-Time Digital Forensic IncidentResponse in Industrial Control Systems.- Leveraging Semantic Relationships to Prioritise Indicators of Compromisein Additive Manufacturing Systems.- WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISM.- Cloud S&P – Cloud Security and PrivacyslytHErin: An Agile Framework for Encrypted Deep Neural Network Inference.- Trust Management Framework for Containerized Workloads – Applications to 5G Networks.- SCI – Secure Cryptographic Implementation.- cPSIR: Circuit-based Private Stateful Information Retrieval for PrivateMedia Consumption.- A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers.- Effcient Arithmetic for Polynomial Multiplication in Post-Quantum Lattice-based Cryptosystem on RISC-V Platform.- Generic Constructions of Server-Aided Revocable ABE with VerifiableTransformation.- Hybrid Post-Quantum Signatures in Hardware Security Keys.- Multi-Armed SPHINCS+.- SpanL: Creating Algorithms for Automatic API Misuse Detection withProgram Analysis Compositions.- ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function withProver-secret.- SecMT – Security in Mobile Technologies.- If you’re scanning this, it’s too late! A QR Code-based Fuzzing Methodology to Identify Input Vulnerabilities In Mobile Apps.- Enabling Lightweight Privilege Separation in Applications withMicroGuards.- SiMLA – Security in Machine Learning and its Applications.- Eliminating Adversarial Perturbations Using Image-to-Image TranslationMethod.- Federated Learning Approach for Distributed Ransomware Analysis.- Forensic Identification of Android Trojans Using Stacked Ensemble of DeepNeural Networks.- POSTERS.- Ransomware detection mechanism – Project status at the beginning of 2023.- AuthZit: Multi-Modal Authentication with Visual-Spatial andText Secrets.- Integration of End-to-End Security and Lightweight-SSL forEnhancing Security and Effciency of MQTT.- Stopping Run-time Countermeasures in CryptographicPrimitives.- Swarm-based IoT Network Penetration Testing by IoT Devices.- Advancing Federated Edge Computing with Continual Learningfor Secure and Effcient Performance.- A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses.- Integrating Quantum Key Distribution into Hybrid Quantum-Classical Networks.- Adaptive Moving Target Defense: Enhancing Dynamic Perturbation through Voltage Sensitivity Analysis in Power Systems.- PriAuct: Privacy Preserving Auction Mechanism.- Using Verifiable Credentials for Authentication of UAVs in Logistics.- A card-based protocol that lets you know how close two partiesare in their opinions (agree/disagree) by using a four-point Likert scale.- Collaborative Authority-Based Searchable Encryption UsingAccess Control Encryption.