語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information Security Applications = ...
~
You, Ilsun.
Information Security Applications = 20th International Conference, WISA 2019, Jeju Island, South Korea, August 21–24, 2019, Revised Selected Papers /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Information Security Applications/ edited by Ilsun You.
其他題名:
20th International Conference, WISA 2019, Jeju Island, South Korea, August 21–24, 2019, Revised Selected Papers /
其他作者:
You, Ilsun.
面頁冊數:
XIII, 384 p. 128 illus., 53 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Artificial Intelligence. -
電子資源:
https://doi.org/10.1007/978-3-030-39303-8
ISBN:
9783030393038
Information Security Applications = 20th International Conference, WISA 2019, Jeju Island, South Korea, August 21–24, 2019, Revised Selected Papers /
Information Security Applications
20th International Conference, WISA 2019, Jeju Island, South Korea, August 21–24, 2019, Revised Selected Papers /[electronic resource] :edited by Ilsun You. - 1st ed. 2020. - XIII, 384 p. 128 illus., 53 illus. in color.online resource. - Security and Cryptology ;11897. - Security and Cryptology ;9241.
Show me your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM -- Turn On the Lights: User Behavior in Game Environment Using CPTED -- QR Code Watermarking for Digital Images -- FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking -- DroPPP: A P4 Approach to Mitigating DoS Attacks in SDN -- A Secure and Self-Tallying E-Voting System Based on Blockchain -- An Extended CTRT for AES-256 -- A Blind Ring Signature Based on the Short Integer Solution Problem -- A Note on the Invisibility and Anonymity of Undeniable Signature Schemes -- Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR -- Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNSS) -- CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network -- A New Password Cracking Model with Generative Adversarial Networks -- Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing -- Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression -- Timed-Release Encryption with Master Time Bound Key -- Is it Possible to Hide My Key into Deep Neural Network -- RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices -- On the Automation of Security Testing for IoT Constrained Scenarios -- Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments -- Secret Sharing on Evolving Multi-Level Access Structure -- Strengthened PAKE Protocols Secure Against Malicious Private Key Generator -- Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof -- Ring-LWE on 8-bit AVR Embedded Processor -- Low-Noise LLC Side-Channel Attack with Perf -- Optimized SIKE Round 2 on 64-bit ARM -- Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea -- An SGX-Based Key Management Framework for Data Centric Networking -- Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR.
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Information Security Applications, WISA 2019, held on Jeju Island, South Korea, in August 2019. The 29 revised full papers presented in this volume were carefully reviewed and selected from 63 submissions. The primary focus of WISA 2019 was on systems and network security including all other technical and practical aspects of security application in general. The papers are grouped in the following topical sections: Application and Game Security; Network Security and Blockchain; Cryptography; Security with AI and Machine Learning; IoT Security; Hardware Security; and Selected Security Issues.
ISBN: 9783030393038
Standard No.: 10.1007/978-3-030-39303-8doiSubjects--Topical Terms:
646849
Artificial Intelligence.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Information Security Applications = 20th International Conference, WISA 2019, Jeju Island, South Korea, August 21–24, 2019, Revised Selected Papers /
LDR
:04291nam a22004215i 4500
001
1017818
003
DE-He213
005
20200706092049.0
007
cr nn 008mamaa
008
210318s2020 gw | s |||| 0|eng d
020
$a
9783030393038
$9
978-3-030-39303-8
024
7
$a
10.1007/978-3-030-39303-8
$2
doi
035
$a
978-3-030-39303-8
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Information Security Applications
$h
[electronic resource] :
$b
20th International Conference, WISA 2019, Jeju Island, South Korea, August 21–24, 2019, Revised Selected Papers /
$c
edited by Ilsun You.
250
$a
1st ed. 2020.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
XIII, 384 p. 128 illus., 53 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Security and Cryptology ;
$v
11897
505
0
$a
Show me your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM -- Turn On the Lights: User Behavior in Game Environment Using CPTED -- QR Code Watermarking for Digital Images -- FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking -- DroPPP: A P4 Approach to Mitigating DoS Attacks in SDN -- A Secure and Self-Tallying E-Voting System Based on Blockchain -- An Extended CTRT for AES-256 -- A Blind Ring Signature Based on the Short Integer Solution Problem -- A Note on the Invisibility and Anonymity of Undeniable Signature Schemes -- Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR -- Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNSS) -- CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network -- A New Password Cracking Model with Generative Adversarial Networks -- Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing -- Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression -- Timed-Release Encryption with Master Time Bound Key -- Is it Possible to Hide My Key into Deep Neural Network -- RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices -- On the Automation of Security Testing for IoT Constrained Scenarios -- Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments -- Secret Sharing on Evolving Multi-Level Access Structure -- Strengthened PAKE Protocols Secure Against Malicious Private Key Generator -- Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof -- Ring-LWE on 8-bit AVR Embedded Processor -- Low-Noise LLC Side-Channel Attack with Perf -- Optimized SIKE Round 2 on 64-bit ARM -- Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea -- An SGX-Based Key Management Framework for Data Centric Networking -- Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR.
520
$a
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Information Security Applications, WISA 2019, held on Jeju Island, South Korea, in August 2019. The 29 revised full papers presented in this volume were carefully reviewed and selected from 63 submissions. The primary focus of WISA 2019 was on systems and network security including all other technical and practical aspects of security application in general. The papers are grouped in the following topical sections: Application and Game Security; Network Security and Blockchain; Cryptography; Security with AI and Machine Learning; IoT Security; Hardware Security; and Selected Security Issues.
650
2 4
$a
Artificial Intelligence.
$3
646849
650
2 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Computing Milieux.
$3
669921
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Information Systems and Communication Service.
$3
669203
650
1 4
$a
Systems and Data Security.
$3
677062
650
0
$a
Artificial intelligence.
$3
559380
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Computers.
$3
565115
650
0
$a
Computer security.
$3
557122
700
1
$a
You, Ilsun.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1255374
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030393021
776
0 8
$i
Printed edition:
$z
9783030393045
830
0
$a
Security and Cryptology ;
$v
9241
$3
1254069
856
4 0
$u
https://doi.org/10.1007/978-3-030-39303-8
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNC
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入