Information Security: 24th International Conference, ISC 2021, Virtual Event, November 10–12, 2021, Proceedings

Author:   Joseph K. Liu ,  Sokratis Katsikas ,  Weizhi Meng ,  Willy Susilo
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2021
Volume:   13118
ISBN:  

9783030913557


Pages:   416
Publication Date:   27 November 2021
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $168.16 Quantity:  
Add to Cart

Share |

Information Security: 24th International Conference, ISC 2021, Virtual Event, November 10–12, 2021, Proceedings


Add your own review!

Overview

Full Product Details

Author:   Joseph K. Liu ,  Sokratis Katsikas ,  Weizhi Meng ,  Willy Susilo
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2021
Volume:   13118
Weight:   0.658kg
ISBN:  

9783030913557


ISBN 10:   3030913554
Pages:   416
Publication Date:   27 November 2021
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Cryptology.- Integer LWE with Non-Subgaussian Error and Related Attacks.- Layering Quantum-Resistance into Classical Digital Signature Algorithms.- Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits.- Cryptanalysis of Two White-Box Implementations of the SM4 Block Cipher.- A Non-Interactive Multi-User Protocol for Private Authorised Query Processing on Genomic Data.- Bigdata-facilitated Two-party Authenticated Key Exchange for IoT.- Randomized Component Based Secure Secret Reconstruction in Insecure Networks.- Transparency order of (n,m)-functions — its further characterization and applications.- Web and OS security.- Browserprint: An Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy.- TridentShell: A Covert and Scalable Backdoor Injection.- Andromeda: Enabling Secure Enclaves For The Android Ecosystem.- Network security.- FEX – A feature extractor for real-time IDS.- Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification.- Detection of malware, attacks and vulnerabilities.- Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic.- A Novel Behavioural Screenlogger Detection System.- DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning.- DVul-WLG: Graph Embedding Network Based on Code Similarity for Cross-architecture Firmware Vulnerability Detection.- Machine learning for security.- Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks.- Targeted Universal Adversarial Perturbations for Automatic Speech Recognition.- Voxstructor: Voice Reconstruction from Voiceprint.- Word-Map: Using Community Detection Algorithm to Detect AGDs.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List