000 | 05667nam a22005895i 4500 | ||
---|---|---|---|
001 | 978-3-031-30122-3 | ||
003 | DE-He213 | ||
005 | 20240207153535.0 | ||
007 | cr nn 008mamaa | ||
008 | 230331s2023 sz | s |||| 0|eng d | ||
020 |
_a9783031301223 _9978-3-031-30122-3 |
||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aFoundations and Practice of Security _h[electronic resource] : _b15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers / _cedited by Guy-Vincent Jourdan, Laurent Mounier, Carlisle Adams, Florence Sèdes, Joaquin Garcia-Alfaro. |
250 | _a1st ed. 2023. | ||
264 | 1 |
_aCham : _bSpringer Nature Switzerland : _bImprint: Springer, _c2023. |
|
300 |
_aXIII, 474 p. 133 illus., 98 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13877 |
|
500 | _aAcceso multiusuario | ||
505 | 0 | _aCryptography -- Security Analysis of Improved EDHOC Protocol -- A Survey on Identity-based Blind Signature -- Do Not Rely on Clock Randomization: A Side-Channel Attack on a Protected Hardware Implementation of AES -- Post-Quantum and UC-secure Oblivious Transfer from SPHF with Grey Zone -- A New Class of Trapdoor Verifiable Delay Functions -- Practical homomorphic evaluation of block-cipher-based hash functions with applications -- Towards a maturity model for crypto-agility assessment -- Machine Learning -- Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher -- Data-driven Evaluation of Intrusion Detectors : a Methodological Framework -- CHIEFS: Corneal-Specular Highlights Imaging for Enhancing Fake-Face Spotter -- Cybercrime and Privacy -- Where is The Python Interpreter? -- Automating Device Fingerprinting Attacks in 4G and 5G NSA Mobile Networks -- Malicious Human Behaviour in Information System Security: Contribution to a Threat Model for Event Detection Algorithms -- A Taxonomy and Gap-analysis in Digital Privacy Education -- Differentially Private Friends Recommendation -- Physical-layer Security -- Underwater Confidential Communications in JANUS -- Defense Models for Data Recovery in Industrial Control Systems -- SCADA Radio Blackbox Reverse Engineering -- Blockchain -- Finding Unchecked Low-Level Calls with Zero False Positives and Negatives in Ethereum Smart Contracts -- Decentralized Vision-Based Byzantine Agent Detection in Multi-Robot Systems with IOTA Smart Contracts -- Money Transfer on Transaction Signature-based Ledger -- A Decentralized Mnemonic Backup System for Non-Custodial Cryptocurrency Wallets -- IoT and Security Protocols -- If-This-Then-Allow-That (to Phone Home): A Trigger-Based Network Policy Enforcement Framework for Smart Homes -- Reducing Trust Assumptions with OSCORE, RISC-V, and Layer 2 One-Time Passwords -- Towards Characterizing IoT Software Update Practices -- Two-Layer Architecture for Signature-Based Attacks Detection over Encrypted Network Traffic -- Short Papers -- A Decision-Support Tool for Experimentation on Zero-Hour Phishing Detection -- Deep-Learning-Based Vulnerability Detection in Binary Executables -- Robustness of Affine and Extended Affine Equivalent Surjective S-Box(es) against Differential Cryptanalysis. | |
520 | _aThis book constitutes the refereed proceedings of the 15th International Symposium on Foundations and Practice of Security, FPS 2022, held in Ottawa, ON, Canada, during December 12-14, 2022. The 26 regular and 3 short papers presented in this book were carefully reviewed and selected from 83 submissions. The papers have been organized in the following topical sections: Cryptography; Machine Learning; Cybercrime and Privacy; Physical-layer Security; Blockchain; IoT and Security Protocols; and Short Papers. | ||
541 |
_fUABC ; _cPerpetuidad |
||
650 | 0 | _aData protection. | |
650 | 1 | 4 | _aData and Information Security. |
700 | 1 |
_aJourdan, Guy-Vincent. _eeditor. _0(orcid)0000-0001-6067-6545 _1https://orcid.org/0000-0001-6067-6545 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aMounier, Laurent. _eeditor. _0(orcid)0000-0001-9925-098X _1https://orcid.org/0000-0001-9925-098X _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aAdams, Carlisle. _eeditor. _0(orcid)0000-0002-7335-9968 _1https://orcid.org/0000-0002-7335-9968 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aSèdes, Florence. _eeditor. _0(orcid)0000-0002-9273-302X _1https://orcid.org/0000-0002-9273-302X _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aGarcia-Alfaro, Joaquin. _eeditor. _0(orcid)0000-0002-7453-4393 _1https://orcid.org/0000-0002-7453-4393 _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031301216 |
776 | 0 | 8 |
_iPrinted edition: _z9783031301230 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v13877 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-3-031-30122-3 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cLIBRO_ELEC | ||
999 |
_c261187 _d261186 |