Information Security and Cryptology – ICISC 2023: 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 – December 1, 2023, Revised Selected Papers, Part II

Author:   Hwajeong Seo ,  Suhri Kim
Publisher:   Springer Verlag, Singapore
Edition:   1st ed. 2024
Volume:   14562
ISBN:  

9789819712373


Pages:   308
Publication Date:   08 March 2024
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $129.35 Quantity:  
Add to Cart

Share |

Information Security and Cryptology – ICISC 2023: 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 – December 1, 2023, Revised Selected Papers, Part II


Add your own review!

Overview

Full Product Details

Author:   Hwajeong Seo ,  Suhri Kim
Publisher:   Springer Verlag, Singapore
Imprint:   Springer Nature
Edition:   1st ed. 2024
Volume:   14562
ISBN:  

9789819712373


ISBN 10:   9819712378
Pages:   308
Publication Date:   08 March 2024
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

​Cyber Security.- A Comparative Analysis of Rust-Based SGX Frameworks: Implications for building SGX applications.- BTFuzzer: a profile-based fuzzing framework for Bluetooth protocols.- mdTLS: How to make middlebox-aware TLS more efficient?.- PHI: Pseudo-HAL Identification for Scalable Firmware Fuzzing.- Lightweight Anomaly Detection Mechanism based on Machine Learning Using Low-Cost Surveillance Cameras.- Applied Cryptography.- Enhancing Prediction Entropy Estimation of RNG for On-the-Fly Test.- Leakage-Resilient Attribute-based Encryption with Attribute-hiding.- Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners.- Single-Shuffle Card-Based Protocols with Six Cards per Gate.- Efficient Result-Hiding Searchable Encryption with Forward and Backward Privacy.- Finsler Encryption.- Feasibility Analysis and Performance Optimization of the Conflict Test Algorithms for Searching Eviction Set.- Korean Post Quantum Cryptography.- Theoretical and Empirical Analysis of FALCON and SOLMAE using their Python Implementation.- Security Evaluation on KpqC Round 1 Lattice-based Algorithms Using Lattice Estimator.- On the security of REDOG.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List