My Account Log in

1 option

Advances in Information and Computer Security : 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8-10, 2021, Proceedings / edited by Toru Nakanishi, Ryo Nojima.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Nakanishi, Tōru, Editor.
Nojima, Ryo, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 12835
Security and Cryptology ; 12835
Language:
English
Subjects (All):
Data protection.
Computer engineering.
Computer networks.
Data and Information Security.
Computer Engineering and Networks.
Local Subjects:
Data and Information Security.
Computer Engineering and Networks.
Physical Description:
1 online resource (XII, 253 pages) : 55 illustrations, 34 illustrations in color.
Edition:
1st ed. 2021.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2021.
System Details:
text file PDF
Summary:
This book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, Japan in September 2021. The conference was held virtually due to COVID-19 pandemic. The 14 regular papers and 3 short paper presented in this volume were carefully reviewed and selected from 37 submissions. They were organized in topical sections named: Lattice-Based Cryptography; System Security; Multiparty Computation; Machine Learning and Security; Post-quantum Cryptography; Symmetric-key Cryptography; Game Theory and Security.
Contents:
Lattice-Based Cryptography A trace map attack against special ring-LWE samples
Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem
System Security KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption
Evidence Collection and Preservation System with Virtual Machine Monitoring
Multiparty Computation Evolving Homomorphic Secret Sharing for Hierarchical Access Structures
Machine Learning and Security Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions
Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language
Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices
FFT Program Generation for Ring LWE-based Cryptography
Symmetric-key Cryptography Optimum Attack on 3-Round Feistel-2 Structure
Post-quantum Cryptography (2) An Intermediate Secret-Guessing Attack on Hash-Based Signatures
Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH
Simple Matrix Signature Scheme
Game Theory and Security Moving Target Defense for the CloudControl Game.
Other Format:
Printed edition:
ISBN:
978-3-030-85987-9
9783030859879
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account