Buch, Englisch, 301 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 487 g
Security and Cryptography
Erscheinungsjahr 2025
ISBN: 978-3-032-09597-8
Verlag: Springer
20th International Conference, SECRYPT 2023, Rome, Italy, July 10-12, 2023, and 21st International Conference, SECRYPT 2024, Dijon, France, July 8-10, 2024, Revised Selected Papers
Buch, Englisch, 301 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 487 g
Reihe: Communications in Computer and Information Science
ISBN: 978-3-032-09597-8
Verlag: Springer
This book includes extended and revised versions of a set of selected papers presented at the 20th International Conference on Security and Cryptography, SECRYPT 2023, which took place in Rome, Italy, during July 10–12, 2023; and the 21st International Conference on Security and Cryptography , SECRYPT 2024, which was held in Dijon, France, during July 8-10, 2024.
This book includes 5 papers from SECRYPT 2023 which has received a total of 169 submissions, for SECRYPT 2024 a total of 175 submission has been received of which 7 papers are included in this book.
They deal with all theoretical and practical asepcts of data protection, privacy, security and applied cryptography, focusing on the application of security technology, the implementation of systems and lessons learned.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz Wissensbasierte Systeme, Expertensysteme
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
Weitere Infos & Material
.- Securing Automatic Identification System Based on Certificateless Cryptography.
.- OSAGE: A Framework for Obfuscated Sample Generation and Evaluation.
.- Empowering Patients for Disease Diagnosis and Clinical Treatment: A Smart Contract-Enabled Informed Consent Strategy.
.- Obtaining Reliability from Untrusted and Unreliable Clouds and (Social) Networks.
.- Deep Learning for DDoS Attack Detection in IoT: A Survey.
.- Iris Recognition from Websites and Social Media: State of the Art and Privacy Concerns.
.- Strengthening Biometric Fuzzy Vault Against Statistical Bias Exploitation.
.- XRPL Protocol: Consensus, Forking and Correctness.
.- Secure Federated Learning with Watermarking and Homomorphic Encryption: A Blockchain-Enhanced Framework.
.- Towards a Cryptographic Model for Wireless Communication: Extended Version.
.- Measuring the Absolute and Relative Prevalence of SQL Concatenations and SQL-Identifier Injections.
.- Security Assessment of Interacting Ethereum Smart Contracts.




