Information Security : 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part I (Lecture Notes in Computer Science) (2024)

個数:

Information Security : 27th International Conference, ISC 2024, Arlington, VA, USA, October 23-25, 2024, Proceedings, Part I (Lecture Notes in Computer Science) (2024)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 336 p.
  • 言語 ENG
  • 商品コード 9783031757563

Full Description

The two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23-25, 2024.

The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections:

Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security.

Part II - Web Security; Intrusion Detection.

Contents

.- Blockchain.

.- The Formal Verification of Aptos Coin.

.- Anonymous, Timed and Revocable Proxy Signatures.

.- Symmetric-Key Cryptography.

.- MILP/MIQCP-Based Differential-Linear Cryptanalysis on CHAM-64/128.

.- Security Analysis of CMAC in the Multi-User Model.

.- Quantum Key Recovery Attacks on 4-round Iterated Even-Mansour with Two Keys.

.- Machine Learning.

.- Optimizing label-only membership inference attacks by global relative decision boundary distances.

.- Risk of Text Backdoor Attacks under Dataset Distillation.

.- Mobile Security and Trusted Execution.

.- Emulating Android Device Drivers via Borrowed Execution Context.

.- Software Security.

.- SyzLego: Enhancing Kernel Directed Greybox Fuzzing via Dependency Inference and Scheduling.

.- A Lightweight Defense Scheme against Usermode Helper Privilege Escalation Using Linux Capability.

.- Multi-Party Computation.

.- Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles.

.- ChronoCloak: An integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination.

.- Large-Plaintext Functional Bootstrapping with Small Parameters for BGV Encoding.

.- Ripple: Accelerating Programmable Bootstraps for FHE with Wavelet Approximations.

.- Robust Multiparty Computation from Threshold Encryption Based on RLWE.

.- Efficient Blind Rotation in FHEW using Refined Decomposition and NTT.

.- Post-Quantum Cryptography.

.- Solving McEliece-1409 in One Day — Cryptanalysis with the Improved BJMM Algorithm.

.- Deep LLL on Module lattices.

.- Multi-way High-throughput Implementation of Kyber.

.- The Role of Message-Bound Signatures for the Beyond UnForgeability Features and Weak Keys.

.- A faster variant of CGL hash function via efficient backtracking checks.

.- Streamlining CSIDH: Cost-Effective Strategies for Group Actions Evaluation.

.- System Security.

.- Channel Robust Strategies with Data Augmentation for Audio Anti-Spoofing.

.- Property Guided Secure Configuration Space Search.

.- Adversarial analysis of software composition analysis tools.

.- News Reader: A News Interest Identification Attack using Single-Electrode Brainwave Signals.

最近チェックした商品