000 | 04003nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-031-51583-5 | ||
003 | DE-He213 | ||
005 | 20240730170913.0 | ||
007 | cr nn 008mamaa | ||
008 | 240104s2024 sz | s |||| 0|eng d | ||
020 |
_a9783031515835 _9978-3-031-51583-5 |
||
024 | 7 |
_a10.1007/978-3-031-51583-5 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSecurity, Privacy, and Applied Cryptography Engineering _h[electronic resource] : _b13th International Conference, SPACE 2023, Roorkee, India, December 14-17, 2023, Proceedings / _cedited by Francesco Regazzoni, Bodhisatwa Mazumdar, Sri Parameswaran. |
250 | _a1st ed. 2024. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2024. |
|
300 |
_aX, 261 p. 36 illus., 25 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14412 |
|
505 | 0 | _aResults on the Key Space of Group-Ring NTRU: The Case of the Dihedral Group -- Gangopadhyay Token Open Secure and Post-quantum Updatable Encryption Based on MLWE -- Knowledge Proofs for SIDH variants with Masked Degree or Torsion -- Post-Quantum DNSSEC over UDP via QNAME-Based Fragmentation -- Cryptanalysis of Short and Provable Secure Lattice-Based Signature Scheme -- Cryptanalysis with Countermeasure on the SIS Based Signature Scheme -- Vulnerability of Dynamic Masking in Test Compression -- An Efficient Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation -- High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of RSA -- On the Masking-Friendly Designs for Post-Quantum Cryptography -- Spliced Region Detection and Localization in Digital Images based on CNN Learning Guided by Color Transitions and Surface Texture -- UN-SPLIT: Attacking Split Manufacturing using Link Prediction in Graph Neural Networks -- Logarithmic-Size (Linkable) Ring Signatures From Lattice Isomorphism Problems -- "We must protect the Transformers": Understanding Efficacy of Backdoor Attack Mitigation on Transformer Models. | |
520 | _aThis book constitutes the refereed proceedings of the 13th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2023, held in Roorkee, India, in December 2023. The 14 papers included in these proceedings were carefully reviewed and selected from 45 submissions. They focus on various aspects of security, privacy, applied cryptography, and cryptographic engineering. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aImage processing _xDigital techniques. _94145 |
|
650 | 0 |
_aComputer vision. _996125 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Communication Networks. _996126 |
650 | 2 | 4 |
_aComputer Imaging, Vision, Pattern Recognition and Graphics. _931569 |
700 | 1 |
_aRegazzoni, Francesco. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _996127 |
|
700 | 1 |
_aMazumdar, Bodhisatwa. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _996129 |
|
700 | 1 |
_aParameswaran, Sri. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _996130 |
|
710 | 2 |
_aSpringerLink (Online service) _996131 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031515828 |
776 | 0 | 8 |
_iPrinted edition: _z9783031515842 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v14412 _923263 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-51583-5 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c87267 _d87267 |