Applied Cryptography and Network Security Workshops (Record no. 96343)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 10062nam a22008535i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-031-41181-6 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730201015.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 231003s2023 sz | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783031411816 |
-- | 978-3-031-41181-6 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-031-41181-6 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UTN |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM053000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UTN |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Applied Cryptography and Network Security Workshops |
Medium | [electronic resource] : |
Remainder of title | ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings / |
Statement of responsibility, etc. | edited by Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Zhang, Yury Zhauniarovich. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2023. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Cham : |
Name of producer, publisher, distributor, manufacturer | Springer Nature Switzerland : |
-- | Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice | 2023. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XIII, 729 p. 182 illus., 122 illus. in color. |
Other physical details | online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS | |
File type | text file |
Encoding format | |
Source | rda |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
International Standard Serial Number | 1611-3349 ; |
Volume/sequential designation | 13907 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | ADSC - Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis -- Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis -- Comprehensive Preimage Security Evaluations on Rijndael-based Hashing -- Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak -- AIBlock - Application Intelligence and Blockchain Security Smart Contract-based E-Voting System Using Homomorphic Encryption and Zero-knowledge Proof -- Preventing Content Cloning in NFT Collections -- NFT Trades in Bitcoin with Off-chain Receipts -- AIHWS - Artificial Intelligence in Hardware Security A Comparison of Multi-task learning and Single-task learning Approaches -- Hide and Seek: Using Occlusion Techniques for Side-Channel Leakage Attribution in CNNs -- Secret Key Recovery Attack on Masked and Shuffed Implementations of CRYSTALS-Kyber and Saber -- SoK: Assisted Fault Simulation Existing Challenges and Opportunities Offered by AI -- Using Model Optimization as Countermeasure against Model Recovery Attacks -- AIoTS - Artificial Intelligence and Industrial IoT Security -- Blockchain-enabled Data Sharing in Connected Autonomous Vehicles for Heterogeneous Networks -- A Security Policy Engine for Building Energy Management Systems -- EARIC: Exploiting ADC Registers in IoT and Control Systems -- CIMSS - Critical Infrastructure and Manufacturing System Security Round-Effcient Security Authentication Protocol for 5G Network -- A Framework for TLS Implementation Vulnerability Testing in 5G -- Safety Watermark: A Defense Tool for Real-Time Digital Forensic Incident Response in Industrial Control Systems -- Leveraging Semantic Relationships to Prioritise Indicators of Compromise in Additive Manufacturing Systems -- WiP: Towards Zero Trust Authentication in Critical Industrial Infrastructures with PRISM -- Cloud S&P - Cloud Security and Privacy slytHErin: An Agile Framework for Encrypted Deep Neural Network Inference -- Trust Management Framework for Containerized Workloads - Applications to 5G Networks -- SCI - Secure Cryptographic Implementation -- cPSIR: Circuit-based Private Stateful Information Retrieval for Private Media Consumption -- A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers -- Effcient Arithmetic for Polynomial Multiplication in Post-Quantum Lattice-based Cryptosystem on RISC-V Platform -- Generic Constructions of Server-Aided Revocable ABE with Verifiable Transformation -- Hybrid Post-Quantum Signatures in Hardware Security Keys -- Multi-Armed SPHINCS+ -- SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions -- ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret -- SecMT - Security in Mobile Technologies -- If you're scanning this, it's too late! A QR Code-based Fuzzing Methodology to Identify Input Vulnerabilities In Mobile Apps -- Enabling Lightweight Privilege Separation in Applications with MicroGuards -- SiMLA - Security in Machine Learning and its Applications -- Eliminating Adversarial Perturbations Using Image-to-Image Translation Method -- Federated Learning Approach for Distributed Ransomware Analysis -- Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural Networks -- POSTERS -- Ransomware detection mechanism - Project status at the beginning of 2023 -- AuthZit: Multi-Modal Authentication with Visual-Spatial and Text Secrets -- Integration of End-to-End Security and Lightweight-SSL for Enhancing Security and Effciency of MQTT -- Stopping Run-time Countermeasures in Cryptographic Primitives -- Swarm-based IoT Network Penetration Testing by IoT Devices -- Advancing Federated Edge Computing with Continual Learning for Secure and Effcient Performance -- A Fine-Grained Metric for Evaluating the Performance of Adversarial Attacks and Defenses -- Integrating Quantum Key Distribution into Hybrid Quantum-Classical Networks -- Adaptive Moving Target Defense: Enhancing Dynamic Perturbation through Voltage Sensitivity Analysis in Power Systems -- PriAuct: Privacy Preserving Auction Mechanism -- Using Verifiable Credentials for Authentication of UAVs in Logistics -- A card-based protocol that lets you know how close two parties are in their opinions (agree/disagree) by using a four-point Likert scale -- Collaborative Authority-Based Searchable Encryption Using Access Control Encryption. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book constitutes the proceedings of the satellite workshops held around the 21st International Conference on Applied Cryptography and Network Security, ACNS 2023, held in Kyoto, Japan, in June 2023. The 34 full papers and 13 poster papers presented in this volume were carefully reviewed and selected from 76 submissions. They stem from the following workshops: · 1st ACNS Workshop on Automated Methods and Data-driven Techniques in Symmetric-key Cryptanalysis (ADSC 2023) · 5th ACNS Workshop on Application Intelligence and Blockchain Security (AIBlock 2023) · 4th ACNS Workshop on Artificial Intelligence in Hardware Security (AIHWS 2023) · 5th ACNS Workshop on Artificial Intelligence and Industrial IoT Security (AIoTS 2023) · 3rd ACNS Workshop on Critical Infrastructure and Manufacturing System Security (CIMSS 2023) · 5th ACNS Workshop on Cloud Security and Privacy (Cloud S&P 2023) · 4th ACNS Workshop on Secure Cryptographic Implementation (SCI 2023) · 4th ACNS Workshop on Security in Mobile Technologies (SecMT 2023) · 5th ACNS Workshop on Security in Machine Learning and its Applications (SiMLA 2023). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data protection. |
9 (RLIN) | 7245 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer engineering. |
9 (RLIN) | 10164 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks . |
9 (RLIN) | 31572 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers. |
9 (RLIN) | 8172 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptography. |
9 (RLIN) | 1973 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data encryption (Computer science). |
9 (RLIN) | 9168 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks |
General subdivision | Security measures. |
9 (RLIN) | 3969 |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data and Information Security. |
9 (RLIN) | 31990 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer Engineering and Networks. |
9 (RLIN) | 165726 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computing Milieux. |
9 (RLIN) | 55441 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptology. |
9 (RLIN) | 31769 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Mobile and Network Security. |
9 (RLIN) | 33624 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Zhou, Jianying. |
Relator term | editor. |
Authority record control number or standard number | (orcid) |
Real World Object URI | 0000-0003-0594-0432 |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 165727 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Batina, Lejla. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 165728 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Li, Zengpeng. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 165729 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Lin, Jingqiang. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 165730 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Losiouk, Eleonora. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 165731 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Majumdar, Suryadipta. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 165732 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Mashima, Daisuke. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 165733 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Meng, Weizhi. |
Relator term | editor. |
Authority record control number or standard number | (orcid) |
Real World Object URI | 0000-0003-4384-5786 |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 165734 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Picek, Stjepan. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 165735 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Rahman, Mohammad Ashiqur. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 165736 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Shao, Jun. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 165737 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Shimaoka, Masaki. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 165738 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Soremekun, Ezekiel. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 165739 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Su, Chunhua. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 165740 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Teh, Je Sen. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 165741 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Udovenko, Aleksei. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 165742 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Wang, Cong. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 165743 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Zhang, Leo. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 165744 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Zhauniarovich, Yury. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 165745 |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
9 (RLIN) | 165746 |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783031411809 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9783031411823 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Lecture Notes in Computer Science, |
International Standard Serial Number | 1611-3349 ; |
Volume/sequential designation | 13907 |
9 (RLIN) | 23263 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-3-031-41181-6">https://doi.org/10.1007/978-3-031-41181-6</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-Lecture Notes in CS |
No items available.