Information Security Practice and Experience (Record no. 96669)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05887nam a22006255i 4500 |
001 - CONTROL NUMBER | |
control field | 978-981-99-7032-2 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240730201714.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 231107s2023 si | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9789819970322 |
-- | 978-981-99-7032-2 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-981-99-7032-2 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM053000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UR |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Information Security Practice and Experience |
Medium | [electronic resource] : |
Remainder of title | 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings / |
Statement of responsibility, etc. | edited by Weizhi Meng, Zheng Yan, Vincenzo Piuri. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2023. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Singapore : |
Name of producer, publisher, distributor, manufacturer | Springer Nature Singapore : |
-- | Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice | 2023. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XIV, 616 p. 157 illus., 114 illus. in color. |
Other physical details | online resource. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS | |
File type | text file |
Encoding format | |
Source | rda |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
International Standard Serial Number | 1611-3349 ; |
Volume/sequential designation | 14341 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Secure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion Recognition -- FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems using Autoencoder-based Latent Space Representations -- Mitigating Sybil Attacks in Federated Learning -- Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics -- Obfuscation padding schemes that minimize Renyi min-entropy for Privacy -- Cross-border Data Security from the Perspective of Risk Assessment -- IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures -- CVAR-FL IoV Intrusion Detection Framework -- Transparent Security Method for Automating IoT Security Assessments -- DIDO: Data Provenance from Restricted TLS 1.3 Websites -- QR-SACP: Quantitative Risk-based Situational Awareness Calculation and Projection through Threat Information Sharing -- Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G -- RTR-Shield: Early Detection of Ransomware using Registry and Trap Files -- MalXCap: A Method for Malware Capability Extraction -- Multimodal Software bug Severity Prediction Based on Sentiment Probability -- Recovering Multi-Prime RSA Keys with Erasures and Errors -- Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example -- Chosen Ciphertext Security for Blind Identity-based Encryption with Certified Identities -- A New Gadget Decomposition Algorithm with Less Noise Growth in HE schemes -- Malicious Player Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations -- Cryptanalysis of Human Identification Protocol with Human-Computable Passwords -- A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS) -- A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability -- LocKey: Location-based Key Extraction from the WiFi Environment in the User's Vicinity -- BAHS: a Blockchain-Aided Hash-based Signature Scheme -- Lever: Making Intensive Validation Practical on Blockchain -- Tikuna: An Ethereum Blockchain Network Security Monitoring System -- Isogeny-based Multi-Signature Scheme -- Security Analysis of WAGE against Division Property based Cube Attack -- When MPC in the Head meets VC -- Quantum Key Distribution as a Service and Its Injection into TLS -- XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph -- XSS attack detection by attention mechanism based on script tags in URLs -- Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning -- SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book constitutes the refereed proceedings of the 18th International Conference on Information Security Practice and Experience, ISPEC 2023, held in Copenhagen, Denmark, in August 2023. The 27 full papers and 8 short papers included in this volume were carefully reviewed and selected from 80 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data protection. |
9 (RLIN) | 7245 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks . |
9 (RLIN) | 31572 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer systems. |
9 (RLIN) | 168385 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Application software. |
9 (RLIN) | 168386 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computers. |
9 (RLIN) | 8172 |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Security Services. |
9 (RLIN) | 78910 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer Communication Networks. |
9 (RLIN) | 168387 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer System Implementation. |
9 (RLIN) | 38514 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer and Information Systems Applications. |
9 (RLIN) | 168388 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computing Milieux. |
9 (RLIN) | 55441 |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data and Information Security. |
9 (RLIN) | 31990 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Meng, Weizhi. |
Relator term | editor. |
Authority record control number or standard number | (orcid) |
Real World Object URI | 0000-0003-4384-5786 |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 168389 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Yan, Zheng. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 168390 |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Piuri, Vincenzo. |
Relator term | editor. |
Relationship | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
9 (RLIN) | 168391 |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
9 (RLIN) | 168392 |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9789819970315 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Printed edition: |
International Standard Book Number | 9789819970339 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Lecture Notes in Computer Science, |
International Standard Serial Number | 1611-3349 ; |
Volume/sequential designation | 14341 |
9 (RLIN) | 23263 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/978-981-99-7032-2">https://doi.org/10.1007/978-981-99-7032-2</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-Lecture Notes in CS |
No items available.