Information Security Practice and Experience
Springer International Publishing (Verlag)
978-3-030-34338-5 (ISBN)
The 21 full and 7 short papers presented in this volume were carefully reviewed and selected from 68 submissions. They were organized into the following topical sections: Cryptography I, System and Network Security, Security Protocol and Tool, Access Control and Authentication, Cryptography II, Data and User Privacy, Short Paper I, and Short Paper II.
Cryptography I.- Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model.- A Bitwise Logistic Regression using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme.- Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme.- Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE.- System and Network Security.- KMO : Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism.- Peel the onion: Recognition of Android apps behind the Tor Network.- JSLess: A Tale of a Fileless Javascript Memory-Resident Malware.- Security Protocol and Tool.- A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation.- Secure Best Arm Identification in Multi-Armed Bandits.- CATCHA: When Cats Track Your Movements Online.- Designing a Code Vulnerability Meta-Scanner.- Access Control and Authentication.- Using IFTTT to Express and Enforce UCON Obligations.- Evaluation of Software PUF Based on Gyroscope.- White-Box Implementation of the KMAC Message Authentication Code.- Cryptography II.- Improving Signature Schemes With Tight Security Reductions.- Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings.- Identity-based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios.- Recovering Internal States of Grain-v1.- Data and User Privacy.- GDPR-Compliant Reputation System Based on Self-Certifying Domain Signatures.- Defining a new composite cybersecurity rating scheme for SMEs in the U.K..- Privacy Preserving Approach in Dynamic Social Network Data Publishing.- Short Paper I.- Using Freivalds' algorithm to accelerate Lattice-Based Signature Verifications.- Group-based Key Exchange Protocol based on Complete Decomposition Search Problem.- Development Activities, Tools and Techniques of Secure Microservices Compositions.- Generating Phishing Emails Using Graph Database.-Short Paper II.- Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection.- The (Persistent) Threat of Weak Passwords: Implementation of a Semi-Automatic Password-Cracking Algorithm.- A Novel and Comprehensive Evaluation Methodology for SIEM.
| Erscheinungsdatum | 07.11.2019 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XIII, 490 p. 130 illus., 59 illus. in color. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 765 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | Applications • Artificial Intelligence • authentication • computer crime • Computer Science • conference proceedings • cryptography • data privacy • digital signature • electronic document identification systems • Encryption • Informatics • Knowledge-Based System • Network Security • privacy • Public Key Cryptography • Research • Social Networks • Software engineering |
| ISBN-10 | 3-030-34338-3 / 3030343383 |
| ISBN-13 | 978-3-030-34338-5 / 9783030343385 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich