|
![]() |
|||
|
||||
OverviewThis book constitutes selected and revised papers from the First Silicon Valley Cybersecurity Conference, held in San Jose, USA, in December 2020. Due to the COVID-19 pandemic the conference was held in a virtual format. The 9 full papers and 6 short papers presented in this volume were thoroughly reviewed and selected from 30 submissions. They present most recent research on dependability, reliability, and security to address cyber-attacks, vulnerabilities,faults, and errors in networks and systems. Full Product DetailsAuthor: Younghee Park , Divyesh Jadav , Thomas AustinPublisher: Springer Nature Switzerland AG Imprint: Springer Nature Switzerland AG Edition: 1st ed. 2021 Volume: 1383 Weight: 0.454kg ISBN: 9783030727246ISBN 10: 3030727246 Pages: 227 Publication Date: 02 April 2021 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsDynamic Security Analysis of Zoom, Google Meet and Microsoft Teams.- A Secure Encapsulation Schemes based on Key Recovery System.- Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator.- STRISA: A New Regulation Architecture to Enforce Travel Rule.- Post-Quantum Hash-Based Signatures for Secure Boot.- Exploring the Coverage of Existing Hardware Vulnerabilities in Community Standards.- MurQRI: Encrypted Multi-Layer QR Codes for Electronic Identity Management.- SpartanGold: A Blockchain for Education, Experimentation, and Rapid Prototyping.- BIOT: A blockchain-based IoT Platform for Distributed Energy Resource Management.- A Privacy Preserving E-voting System based on Blockchain.- Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity.- ConTheModel: Can we modify tweets to confuse classifier models?.- A Systematic Approach to Building Autoencoders for Intrusion Detection.- An Attack on Quantum Circuits Based on the Error Rates of NISQ Systems and a Countermeasure.- Cryptocurrency with Multiple Sequence Alignment Proof-of-Work.- IoT Checker Using Timing Side-channel and Machine Learning.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |