Information Security and Cryptology - ICISC 2024 : 27th International Conference, Seoul, South Korea, November 20-22, 2024, Revised Selected Papers (Lecture Notes in Computer Science)

個数:

Information Security and Cryptology - ICISC 2024 : 27th International Conference, Seoul, South Korea, November 20-22, 2024, Revised Selected Papers (Lecture Notes in Computer Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 475 p.
  • 言語 ENG
  • 商品コード 9789819655656

Full Description

This book constitutes the refereed proceedings of the 27th International Conference on Information Security and Cryptology on Information Security and Cryptology - ICISC 2024, held in Seoul, South Korea, during November 20-22, 2024.

The 23 full papers included in this book were carefully reviewed and selected from 58 submissions. They were organized in topical sections as follows: cryptanalysis of block ciphers; signature schemes; applied cryptography; quantum cryptography and deep learning based analysis; side-channel and automotive attack; cyber security; and AI security.

Contents

.- Exploring the Optimal Differential Characteristics of SM4: Improving Automatic Search by Including Human Insights.

.- Investigation of the Optimal Linear Characteristics of BAKSHEESH.

.- Designated-Verifier Ring Signatures: Strong Definitions, Generic Constructions and Efficient Instantiations.

.- Tightly Secure Lattice-based Synchronized Aggregate Signature in Standard Model.

.- FineDReaM : A Boolean Query Searchable KP-ABE-Based Fine-Grained Authorized Encrypted-Data Retrieval Mechanism.

.- A Formal Treatment of Envelope Encryption.

.- Efficient Privacy-Preserving Counting Method with Homomorphic Encryption.

.- Experimental Analysis of the Optimization-based Factorization Algorithm.

.- Fast Private Set Intersection from Polynomial Multiplication Triples.

.- Enhancing Differential Fuzzing of Cryptographic Libraries with Sustainable Hybrid Fuzzing and Crypto-Specific Mutation.

.- RSA Quantum Cryptanalysis: A Thorough Exploration of n-Bit Attacks and Emerging Factoring Techniques.

.- Quantum Circuit for Curve25519 with Fewer Qubits.

.- CS-Net: A Deep Learning-Based Analysis for the Cryptography and Steganography.

.- REAF: Replacing Exponential Activation Function to Prevent Side-Channel Analysis.

.- Assessment of Automotive Attack Feasibility Methods in Comparison to Railway and Aviation Methods.

.- Simultaneous Multiplication Protocol based on Packed Linear Secret Sharing and its Applications.

.- Reinterpreting System Calls for Enhanced IoT Malware Analysis Using Function Call Graphs.

.- LUA-IoT: Let's Usably Authenticate the IoT.

.- An Information-Sharing System that Guarantees the Authenticity and Privacy of Contributors.

.- Malicious node identification based on behavioral statistical features and social relationships.

.- LiST+: An Improved Lightweight Sharable and Traceable Secure Mobile Health System.

.- Pre-trained Language Models for Alert Aggregation: Limitations and Opportunities.

.- Does Ordinality in Encoding Matter for XAI? A Case Study on Explainable IDS.

最近チェックした商品