Silicon Valley Cybersecurity Conference : First Conference, SVCC 2020, San Jose, CA, USA, December 17-19, 2020, Revised Selected Papers (Communications in Computer and Information Science)

個数:

Silicon Valley Cybersecurity Conference : First Conference, SVCC 2020, San Jose, CA, USA, December 17-19, 2020, Revised Selected Papers (Communications in Computer and Information Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 227 p.
  • 商品コード 9783030727246

Full Description

This book constitutes selected and revised papers from the First Silicon Valley Cybersecurity Conference, held in San Jose, USA, in December 2020. Due to the COVID-19 pandemic the conference was held in a virtual format. 
The 9 full papers and 6 short papers presented in this volume were thoroughly reviewed and selected from 30 submissions. They present most recent research on dependability, reliability, and security to address cyber-attacks, vulnerabilities,faults, and errors in networks and systems.

Contents

Dynamic Security Analysis of Zoom, Google Meet and Microsoft Teams.- A Secure Encapsulation Schemes based on Key Recovery System.- Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator.- STRISA: A New Regulation Architecture to Enforce Travel Rule.- Post-Quantum Hash-Based Signatures for Secure Boot.- Exploring the Coverage of Existing Hardware Vulnerabilities in Community Standards.- MurQRI: Encrypted Multi-Layer QR Codes for Electronic Identity Management.- SpartanGold: A Blockchain for Education, Experimentation, and Rapid Prototyping.- BIOT: A blockchain-based IoT Platform for Distributed Energy Resource Management.- A Privacy Preserving E-voting System based on Blockchain.- Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity.- ConTheModel: Can we modify tweets to confuse classifier models?.-  A Systematic Approach to Building Autoencoders for Intrusion Detection.- An Attack on Quantum Circuits Based on the Error Rates of NISQ Systems and a Countermeasure.- Cryptocurrency with Multiple Sequence Alignment Proof-of-Work.- IoT Checker Using Timing Side-channel and Machine Learning.

最近チェックした商品