000 07000nam a22007335i 4500
001 978-981-99-7356-9
003 DE-He213
005 20240730201510.0
007 cr nn 008mamaa
008 231019s2023 si | s |||| 0|eng d
020 _a9789819973569
_9978-981-99-7356-9
024 7 _a10.1007/978-981-99-7356-9
_2doi
050 4 _aQA76.9.D35
050 4 _aQ350-390
072 7 _aUMB
_2bicssc
072 7 _aGPF
_2bicssc
072 7 _aCOM021000
_2bisacsh
072 7 _aUMB
_2thema
072 7 _aGPF
_2thema
082 0 4 _a005.73
_223
082 0 4 _a003.54
_223
245 1 0 _aInformation and Communications Security
_h[electronic resource] :
_b25th International Conference, ICICS 2023, Tianjin, China, November 18-20, 2023, Proceedings /
_cedited by Ding Wang, Moti Yung, Zheli Liu, Xiaofeng Chen.
250 _a1st ed. 2023.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2023.
300 _aXXV, 763 p. 209 illus., 169 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14252
505 0 _aSymmetric-Key Cryptography -- SAT-aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA -- Improved Related-Key Rectangle Attack against the Full AES-192 -- Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM -- Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher -- PAE: Towards More Efficient and BBB-secure AE From a Single Public Permutation -- Public-Key Cryptography -- A Polynomial-time Attack on G2SIDH -- Improvements of Homomorphic Secure Evaluation of Inverse Square Root -- Oblivious Transfer from Rerandomizable PKE -- Forward Secure Lattice-based Ring Signature Scheme in the Standard Model -- Applied Cryptography -- Secure Multi-Party Computation with Legally-Enforceable Fairness -- On-demand Allocation of Cryptographic Computing Resource with Load Prediction -- Private Message Franking with After Opening Privacy -- Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction -- Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography -- Authentication and Authorization -- PiXi: Password Inspiration by Exploring Information -- Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris Verification -- A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things -- BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks -- Privacy and Anonymity -- Link Prediction-Based Multi-Identity Recognition of Darknet Vendors -- CryptoMask: Privacy-preserving Face Recognition -- Efficient Private Multiset ID Protocols -- Zoomer: A Website Fingerprinting Attack against Tor Hidden Services -- An Enhanced Privacy-preserving Hierarchical Federated Learning Framework for IoV -- Security and Privacy of AI -- Revisiting the Deep Learning-based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors -- Multi-scale Features Destructive Universal Adversarial Perturbations -- Pixel-Wise Reconstruction of Private Data in Split Federated Learning -- Neural Network Backdoor Attacks Fully Controlled by Composite Natural Utterance Fragments -- Black-Box Fairness Testing with Shadow Models -- Graph Unlearning using Knowledge Distillation -- AFLOW: Developing Adversarial Examples under Extremely Noise-limited Settings -- Learning to Detect Deepfakes via Adaptive Attention and Constrained Difference -- A Novel Deep Ensemble Framework for Online Signature Verification Using Temporal and Spatial Representation -- Blockchain and Cryptocurrencies -- SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains -- Subsidy Bridge: Rewarding Cross-blockchain Relayers with Subsidy -- Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-based Cryptocurrency Transactions -- Blockchain based Publicly Auditable Multi-Party Computation with Cheater Detection -- BDTS: Blockchain-based Data Trading System -- Illegal Accounts Detection on Ethereum using Heterogeneous Graph Transformer Networks -- System and Network security -- DRoT: A Decentralised Root of Trust for Trusted Networks -- Finding Missing Security Operation Bugs via Program Slicing and Differential Check -- TimeClave: Oblivious In-enclave Time series Processing System -- Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios -- A Fake News Detection Method Based on A Multimodal Cooperative Attention Network.
520 _aThis volume LNCS 14252 constitutes the refereed proceedings of 25th International Conference on Information and Communications Security, ICICS 2023, held in Tianjin, China, during November 18-20, 2023. The 38 full papers presented together with 6 short papers were carefully reviewed and selected from 181 submissions. The conference focuses on: Symmetric-Key Cryptography; Public-Key Cryptography; Applied Cryptography; Authentication and Authorization; Privacy and Anonymity; Security and Privacy of AI; Blockchain and Cryptocurrencies; and System and Network Security.
650 0 _aData structures (Computer science).
_98188
650 0 _aInformation theory.
_914256
650 0 _aDatabase management.
_93157
650 0 _aData mining.
_93907
650 0 _aApplication software.
_9167419
650 0 _aImage processing
_xDigital techniques.
_94145
650 0 _aComputer vision.
_9167420
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 1 4 _aData Structures and Information Theory.
_931923
650 2 4 _aDatabase Management.
_93157
650 2 4 _aData Mining and Knowledge Discovery.
_9167421
650 2 4 _aComputer and Information Systems Applications.
_9167422
650 2 4 _aComputer Imaging, Vision, Pattern Recognition and Graphics.
_931569
650 2 4 _aCryptology.
_931769
700 1 _aWang, Ding.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9167423
700 1 _aYung, Moti.
_eeditor.
_0(orcid)
_10000-0003-0848-0873
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9167424
700 1 _aLiu, Zheli.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9167425
700 1 _aChen, Xiaofeng.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9167426
710 2 _aSpringerLink (Online service)
_9167427
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789819973552
776 0 8 _iPrinted edition:
_z9789819973576
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v14252
_923263
856 4 0 _uhttps://doi.org/10.1007/978-981-99-7356-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c96563
_d96563