Information Security : 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings (Lecture Notes in Computer Science)

個数:

Information Security : 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings (Lecture Notes in Computer Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 510 p.
  • 商品コード 9783031223891

Full Description

This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022.
The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.

Contents

Cryptography.- Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs.- Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting.- Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files.- Witness Encryption from Smooth Projective Hashing System.- Post-Quantum Cryptography.- More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model.- QUIC Protocol with Post-Quantum Authentication.- Batched Fully Homomorphic Encryption from TFHE.- Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization.- Cryptanalysis.- Further Cryptanalysis of a Type of RSA Variants.- The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64.- Efficient Scalar Multiplication on Koblitz Curves with Pre-computation.- Blockchain.- Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps.- Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization.- GRUZ : Practical Resource Fair Exchange without Blockchain.- Daric: A Storage Efficient Payment Channel With Punishment Mechanism.- A Blockchain-based Mutual Authentication Protocol for Smart Home.- Email and Web Security.- OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control.- EarlyCrow: Detecting APT Malware Command and Control Over HTTP(S) Using Contextual Summaries.- Malware.- ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence.- Dissecting Applications Uninstallers & Removers: Are they effective?.- Representing LLVM-IR in a Code Property Graph.- Why we need a theory of maliciousness: Hardware Performance Counters in security.- Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination With Whole-system Replay.- AI Security.- AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition.- HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud.- Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64.- CFL: Cluster Federated Learning in Large-scale Peer-to-Peer Networks.- Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing.- Communication-Efficient and Secure Federated Learning Based on AdaptiveOne-bit Compressed Sensing.

最近チェックした商品