Mimura / Minematsu | Advances in Information and Computer Security | Buch | 978-981-97-7736-5 | sack.de

Buch, Englisch, Band 14977, 308 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 487 g

Reihe: Lecture Notes in Computer Science

Mimura / Minematsu

Advances in Information and Computer Security

19th International Workshop on Security, IWSEC 2024, Kyoto, Japan, September 17-19, 2024, Proceedings
2024
ISBN: 978-981-97-7736-5
Verlag: Springer Nature Singapore

19th International Workshop on Security, IWSEC 2024, Kyoto, Japan, September 17-19, 2024, Proceedings

Buch, Englisch, Band 14977, 308 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 487 g

Reihe: Lecture Notes in Computer Science

ISBN: 978-981-97-7736-5
Verlag: Springer Nature Singapore


This book constitutes the proceedings of the 19th International Workshop on Security on Advances in Information and Computer Security, IWSEC 2024, held in Kyoto, Japan, in September 17-19, 2024.

The 14 full papers and 3 short papers were carefully reviewed and selected from 47 submissions. These papers were categorized into the following sections: authenticated encryption; symmetric-key cryptanalysis; protocols; analysis of public-key cryptosystems; vulnerability; malware countermeasure; network security and privacy.

Mimura / Minematsu Advances in Information and Computer Security jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


.- Authenticated Encryption. 

.- Bit-wise Analysis for Forgery Attacks on AES-based AEAD Schemes.

.- Cryptanalysis of Authenticated Encryption Modes for Wireless and Real-Time Systems.

.- Symmetric-key Cryptanalysis. 

.- Higher-order Mixture Differentials for AES-based Block Ciphers and Applications to TweAES.

.- Weak Keys of the Full MISTY1 Recovered in Practical Time.

.- Protocols. 

.- Efficient Card-Based Protocols with a Standard Deck of Playing Cards Using Partial Opening.

.- Attribute-Based Inner Product Functional Encryption in Key-Policy Setting from Pairing.

.- Analysis of Public-key Cryptosystems. 

.- Formal Verification of Emulated Floating-Point Arithmetic in Falcon.

.- Experimental Analysis of Integer Factorization Methods Using Lattices.

.- Sieving Method for SDP with the Zero Window: An Improvement in Low Memory Environments.

.- Vulnerability. 

.- Race condition vulnerabilities in WordPress plug-ins.

.- Finding (and exploiting) vulnerabilities on IP Cameras: the Tenda CP3 case study.

.- Malware Countermeasure. 

.- File System Shield (FSS): A Pass-Through Strategy Against Unwanted Encryption in Network File Systems.

.- Implementation for Malicious Software using ChatGPT-4.

.- A Markov Game Model for Evaluating Cybersecurity Attacks on Cloud.

.- Network Security and Privacy. 

.- Few Edges Are Enough: Few-Shot Network Attack Detection with Graph Neural Networks.

.- Information Leakage through Packet Lengths in RTC Traffic.

.- A Study on Anonymization through Participation in iPWS Cup 2023.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.