Foundations and Practice of Security (eBook, PDF)
15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers
Redaktion: Jourdan, Guy-Vincent; Garcia-Alfaro, Joaquin; Sèdes, Florence; Adams, Carlisle; Mounier, Laurent
65,95 €
65,95 €
inkl. MwSt.
Sofort per Download lieferbar
33 °P sammeln
65,95 €
Als Download kaufen
65,95 €
inkl. MwSt.
Sofort per Download lieferbar
33 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
65,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
33 °P sammeln
Foundations and Practice of Security (eBook, PDF)
15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers
Redaktion: Jourdan, Guy-Vincent; Garcia-Alfaro, Joaquin; Sèdes, Florence; Adams, Carlisle; Mounier, Laurent
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 15th International Symposium on Foundations and Practice of Security, FPS 2022, held in Ottawa, ON, Canada, during December 12-14, 2022. The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 34.92MB
Andere Kunden interessierten sich auch für
- Foundations and Practice of Security (eBook, PDF)48,95 €
- Foundations and Practice of Security (eBook, PDF)40,95 €
- Information Security Practice and Experience (eBook, PDF)73,95 €
- Foundations and Practice of Security (eBook, PDF)44,95 €
- Foundations and Practice of Security (eBook, PDF)65,95 €
- Foundations and Practice of Security (eBook, PDF)40,95 €
- Science of Cyber Security (eBook, PDF)40,95 €
-
-
- -21%11
This book constitutes the refereed proceedings of the 15th International Symposium on Foundations and Practice of Security, FPS 2022, held in Ottawa, ON, Canada, during December 12-14, 2022.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 474
- Erscheinungstermin: 31. März 2023
- Englisch
- ISBN-13: 9783031301223
- Artikelnr.: 67716140
- Verlag: Springer International Publishing
- Seitenzahl: 474
- Erscheinungstermin: 31. März 2023
- Englisch
- ISBN-13: 9783031301223
- Artikelnr.: 67716140
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Cryptography.- Security Analysis of Improved EDHOC Protocol.- A Survey on Identity-based Blind Signature.- Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES.- Post-Quantum and UC-secure Oblivious Transfer from SPHF with Grey Zone.- A New Class of Trapdoor Verifiable Delay Functions.- Practical homomorphic evaluation of block-cipher-based hash functions with applications.- Towards a maturity model for crypto-agility assessment.- Machine Learning.- Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher.- Data-driven Evaluation of Intrusion Detectors : a Methodological Framework.- CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter.- Cybercrime and Privacy.- Where is The Python Interpreter?.- Automating Device Fingerprinting Attacks in 4G and5G NSA Mobile Networks.- Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms.- A Taxonomy and Gap-analysis in Digital Privacy Education.- Differentially Private Friends Recommendation.- Physical-layer Security.- Underwater Confidential Communications in JANUS.- Defense Models for Data Recovery in Industrial Control Systems.- SCADA Radio Blackbox Reverse Engineering.- Blockchain.- Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts.- Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts.- Money Transfer on Transaction Signature-based Ledger.- A Decentralized Mnemonic Backup System for Non-Custodial Cryptocurrency Wallets.- IoT and Security Protocols.- If-This-Then-Allow-That (to Phone Home): A Trigger-Based NetworkPolicy Enforcement Framework for Smart Homes.- Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords.- Towards Characterizing IoT Software Update Practices.- Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic.- Short Papers.- A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection.- Deep-Learning-Based Vulnerability Detection in Binary Executables.- Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis.
Cryptography.- Security Analysis of Improved EDHOC Protocol.- A Survey on Identity-based Blind Signature.- Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES.- Post-Quantum and UC-secure Oblivious Transfer from SPHF with Grey Zone.- A New Class of Trapdoor Verifiable Delay Functions.- Practical homomorphic evaluation of block-cipher-based hash functions with applications.- Towards a maturity model for crypto-agility assessment.- Machine Learning.- Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher.- Data-driven Evaluation of Intrusion Detectors : a Methodological Framework.- CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter.- Cybercrime and Privacy.- Where is The Python Interpreter?.- Automating Device Fingerprinting Attacks in 4G and5G NSA Mobile Networks.- Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms.- A Taxonomy and Gap-analysis in Digital Privacy Education.- Differentially Private Friends Recommendation.- Physical-layer Security.- Underwater Confidential Communications in JANUS.- Defense Models for Data Recovery in Industrial Control Systems.- SCADA Radio Blackbox Reverse Engineering.- Blockchain.- Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts.- Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts.- Money Transfer on Transaction Signature-based Ledger.- A Decentralized Mnemonic Backup System for Non-Custodial Cryptocurrency Wallets.- IoT and Security Protocols.- If-This-Then-Allow-That (to Phone Home): A Trigger-Based NetworkPolicy Enforcement Framework for Smart Homes.- Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords.- Towards Characterizing IoT Software Update Practices.- Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic.- Short Papers.- A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection.- Deep-Learning-Based Vulnerability Detection in Binary Executables.- Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis.