標題: Titlebook: Information Security Practice and Experience; 19th International C Zhe Xia,Jiageng Chen Conference proceedings 2025 The Editor(s) (if appli [打印本頁] 作者: Defect 時間: 2025-3-21 19:13
書目名稱Information Security Practice and Experience影響因子(影響力)
書目名稱Information Security Practice and Experience影響因子(影響力)學科排名
書目名稱Information Security Practice and Experience網(wǎng)絡(luò)公開度
書目名稱Information Security Practice and Experience網(wǎng)絡(luò)公開度學科排名
書目名稱Information Security Practice and Experience被引頻次
書目名稱Information Security Practice and Experience被引頻次學科排名
書目名稱Information Security Practice and Experience年度引用
書目名稱Information Security Practice and Experience年度引用學科排名
書目名稱Information Security Practice and Experience讀者反饋
書目名稱Information Security Practice and Experience讀者反饋學科排名
作者: Saline 時間: 2025-3-21 21:14 作者: 戰(zhàn)役 時間: 2025-3-22 04:25
Information Security Practice and Experience978-981-97-9053-1Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 令人悲傷 時間: 2025-3-22 05:50 作者: 離開 時間: 2025-3-22 12:38 作者: 搖擺 時間: 2025-3-22 13:37 作者: 樣式 時間: 2025-3-22 20:54 作者: GRATE 時間: 2025-3-22 21:47
,Differential Cryptanalysis Against SIMECK Implementation in?a?Leakage Profiling Scenario,inst differential cryptanalysis is not clear. In light of this, the security of three versions of SIMECK implementation against differential cryptanalysis is considered in a leakage profiling scenario. In a leakage profiling scenario, the leakages of three versions of SIMECK implementation can be ch作者: 詞匯 時間: 2025-3-23 05:08 作者: 投票 時間: 2025-3-23 05:44
,Related-Tweakey Boomerang and?Rectangle Attacks on?Reduced-Round Joltik-BC,k cipher Joltik-BC. In ASIACRYPT 2014, designers stated that the real threat to Joltik-BC comes from attacks that exploit the tweakey schedule, i.e. related-tweakey differential attacks. However, there has been no such attack against Joltik-BC currently. In the paper, we evaluate the resistance to J作者: 不規(guī)則的跳動 時間: 2025-3-23 11:29 作者: 善于 時間: 2025-3-23 15:59
,A New Construction of?Leakage-Resilient Identity-Based Encryption Scheme,ctice because of various leakage attacks. Therefore, the leakage resilience property should be considered in designing these primitives. However, in identity-based cryptography, most of the existing leakage-resilient identity-based encryption (IBE) schemes suffer some limitations: they either resist作者: Dendritic-Cells 時間: 2025-3-23 21:39 作者: BADGE 時間: 2025-3-23 22:56 作者: Accolade 時間: 2025-3-24 06:26
,Breaking GEA-Like Stream Ciphers with?Lower Time Cost,ed version of GEA-2 proposed recently. In this paper, new weaknesses of GEA-like stream ciphers (i.e., GEA-1, GEA-2 and GEA-2a) are discovered and analyzed. As the technical contribution, an automatic algorithm is proposed to search for differential paths of full GEA-like stream ciphers. By this aut作者: 細節(jié) 時間: 2025-3-24 08:53
SNIPER: Detect Complex Attacks Accurately from Traffic,me processes of APT attacks inevitably expose behavioral beacons in traffic, which makes it possible to detect APT attacks from traffic. Unlike deploying attack detectors at end devices or critical servers, anomaly detection at the network entrance provides a larger monitoring field but has to bear 作者: 爵士樂 時間: 2025-3-24 13:47 作者: delegate 時間: 2025-3-24 17:38 作者: OVERT 時間: 2025-3-24 21:47
,Parallel Implementation of?Sieving Algorithm on?Heterogeneous CPU-GPU Computing Architectures,ely utilize either CPUs or GPUs. This paper introduces a novel sieving approach tailored to CPU+GPU heterogeneous computing platforms. We constructed a runtime system capable of concurrently executing both CPU and GPU versions of the sieving algorithm. The GPU version of the sieving algorithm reduce作者: Excitotoxin 時間: 2025-3-25 00:09
,Unveiling the?Efficacy of?BERT’s Attention in?Memory Obfuscated Malware Detection, by targeting a system’s volatile memory. By leveraging transformer-based models, notably BERT, the research demonstrates promising advancements in malware detection. Through data augmentation and rigorous feature selection processes, the study enhances the CIC-MlMem-2022 dataset, improving its qual作者: Conduit 時間: 2025-3-25 07:07
An eID-Based Privacy-Enhanced Public Transportation Ticket System,ities and their customers. These benefits include fast and compatible verification processes and mechanisms for replacing lost tickets. Additionally, the system provides security against forgery through cryptographic mechanisms. Most e-ticketing systems use RFID technology to facilitate authenticati作者: dapper 時間: 2025-3-25 09:36 作者: 腐爛 時間: 2025-3-25 13:51 作者: 倫理學 時間: 2025-3-25 18:26
Long Teng,Qi Feng,Wei Zhao,Min Luo,Debiao Hees those who are involved in genomics research, whether as researcher, participant or policy maker, to understand the ethical issues currently developing in this field and to participate actively in these important debates. A clear account is given of how science and technology are outstripping the 作者: 發(fā)炎 時間: 2025-3-25 21:29
Yujing Liu,Jiangbin Chen,Shuhui Cheny complex issues.An extensive glossary explains all relevant.New developments in science and technology have resulted in shifting ethical challenges in many areas including in genomics research. This book enables those who are involved in genomics research, whether as researcher, participant or poli作者: 責難 時間: 2025-3-26 00:42 作者: lethargy 時間: 2025-3-26 05:01 作者: 侵害 時間: 2025-3-26 08:38 作者: 入會 時間: 2025-3-26 15:20 作者: SIT 時間: 2025-3-26 17:49
Congrong Peng,Cong Peng,Xiaolin Yang,Qingcai Luo,Min Luoian concerns, thus offering the possibility of international ethical citizenship. For Green, the ethical citizen is what we might call a ‘cosmopolitan communitarian’ (or perhaps a ‘communitarian cosmopolitan’). The first section, ‘Ethical Citizenship’ presents aspects of ethical citizenship. The sec作者: Insensate 時間: 2025-3-27 00:48
Zirui Qiao,Ran Xu,Yonghui Lu,Yanwei Zhou,Bo Yanges. Bosanquet’s references to the state are predominantly to the nation state (1917a: p. 295), and Miller argues that there are good reasons for states and nations to coincide. More to the point, there are essential similarities in the reasons why these two thinkers believe in the ethical significan作者: 古代 時間: 2025-3-27 02:34 作者: LAST 時間: 2025-3-27 05:52 作者: conduct 時間: 2025-3-27 10:18 作者: 現(xiàn)存 時間: 2025-3-27 15:20 作者: 未開化 時間: 2025-3-27 18:55
Liwei Liu,Zijian Liu,Na Ruant was with this awareness that Elizabeth Warrenton Wells and James Wells Sr.. chose to marry.. By the time the Civil War started, “the white population in 1860 was in the minority”. and “Mississippi’s social, economic, and political institutions were hopelessly entangled in the web of slavery. An in作者: Eeg332 時間: 2025-3-28 00:26
Zhusen Liu,Jiafei Wu,Zhe Liun its Confederacy status. signaled that the end of the Civil War was not, however, the end of oppressive conditions for blacks. In a move that would have devastating consequences for freed-persons of color, Mississippi adopted black codes. to regulate African Americans’ participation in the state’s 作者: Console 時間: 2025-3-28 06:07 作者: Injunction 時間: 2025-3-28 08:28
Md Mashrur Arifin,Troy Suyehara Tolman,Jyh-haw Yeht was with this awareness that Elizabeth Warrenton Wells and James Wells Sr.. chose to marry.. By the time the Civil War started, “the white population in 1860 was in the minority”. and “Mississippi’s social, economic, and political institutions were hopelessly entangled in the web of slavery. An in作者: Esophagus 時間: 2025-3-28 12:08 作者: 符合規(guī)定 時間: 2025-3-28 17:56 作者: incite 時間: 2025-3-28 20:20
Mingwu Zhang,Yulu Zhong,Yifei Wang,Yuntao Wangy informed and safeguarded and institutional reputational damage is prevented. These codes have coalesced around increasingly standardised core criteria, with the expectation that they will be adhered to by all employed and funded researchers. This chapter argues however that the dominance of standa作者: 改變立場 時間: 2025-3-29 01:14 作者: 慎重 時間: 2025-3-29 05:03
Conference proceedings 2025 in Wuhan, China, during October 25–27, 2024.?..The 22 full papers presented in this volume were carefully reviewed and selected from 70 submissions.?They cover multiple topics of cyber security and applied cryptography.?The main goal of ISPEC 2024 conference was to promote research on new informati作者: 原諒 時間: 2025-3-29 10:20 作者: 元音 時間: 2025-3-29 12:52 作者: 離開可分裂 時間: 2025-3-29 16:07
0302-9743 information security technologies, including their applications and their integration with IT systems in various vertical sectors..978-981-97-9052-4978-981-97-9053-1Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: ingenue 時間: 2025-3-29 20:16 作者: 健談的人 時間: 2025-3-30 02:35
Lattice-Based Universal Designated Multi-verifiers Signature Scheme,schemes. Moreover, based on the small integer solution (.) problem and the learning with errors (.) problem, the proposed lattice-based . scheme is provably secure in the random oracle model for the strong unforgeability, the non-transferability and the privacy of signer’s identity.作者: Agronomy 時間: 2025-3-30 04:51 作者: curriculum 時間: 2025-3-30 10:43
,Breaking GEA-Like Stream Ciphers with?Lower Time Cost,ted. All these attacks have been confirmed by experimental results on a common PC. The cryptanalytic results show that the initializations of all GEA-like stream ciphers are far from being optimal and need to be strengthened.作者: 發(fā)起 時間: 2025-3-30 14:13
Efficient Large-Scale Multi-party Computation Based on Garbled Circuit, circuit, where parties generate a garbled circuit based on the related path in the circuit rather than the entire circuit. Through experimental evaluation and comparison with related work, the proposed scheme demonstrates dramatic improvement in computation and communication efficiency for each party when the number of parties increases.作者: AWE 時間: 2025-3-30 18:06 作者: nurture 時間: 2025-3-31 00:43
Yujing Liu,Jiangbin Chen,Shuhui Chen is a particular emphasis on understanding the problems of ethical regulations and practice in the institutional and social context of research. A glossary and numerous text boxes explaining relevant terms and 978-3-642-42719-0978-3-642-23699-0作者: arthrodesis 時間: 2025-3-31 01:11 作者: 女上癮 時間: 2025-3-31 05:44
,Secure Federated Distillation Framework for?Encrypted Traffic Classification,taset ISCX CICDarknet2020 and real dataset DarkCSE2023 containing popular application traffic, including VPN and Tor. Experiments show that our proposed framework achieves precision of . and recall of . in centralized setting, precision of ., and recall of . in federated setting, which is superior t作者: cinder 時間: 2025-3-31 11:21 作者: Counteract 時間: 2025-3-31 17:14
,Shrinkable Ring Signatures: It Wasn’t Them!,igned signature is actually on behalf of a smaller ring than the original one. We also formalize the syntax and security models for SRS. In terms of construction, we design a generic framework for an SRS from a Merkle-tree-based accumulator, a collision-resistant one-way function, a public key encry作者: 者變 時間: 2025-3-31 17:53 作者: inculpate 時間: 2025-3-31 23:16
,Isogeny-Based Password-Authenticated Key Exchange Based on?Shuffle Algorithm,ll prevent trivial attacks using twists. Due to the use of Merkle root and password in the shuffle function, the attackers cannot select a message from the received message. Also, the length of the message used for key derivation is reduced from . to .. We prove the security based on the security as作者: PLUMP 時間: 2025-4-1 03:12
,A New Construction of?Leakage-Resilient Identity-Based Encryption Scheme,assumption. In addition, the leakage-resilient CCA security can be obtained from the above CPA secure IBE scheme. That is, a generic method created leakage-resilient CCA secure public-key encryption is proposed, and the leakage-resilient CCA secure IBE scheme can also be created. Therefore, we propo作者: 提升 時間: 2025-4-1 07:30
,Enhancing Portability in?Deep Learning-Based Side-Channel Attacks Against Kyber,st Kyber, highlighting their negative impact on attack efficiency. Real-world implementations are conducted on an STM32F407G board with an ARM Cortex-M4 microcontroller, using code from the well-known open-source pqm4 library. The results demonstrate that our Ablated-MLPM approach achieves more than作者: Androgen 時間: 2025-4-1 12:11
SNIPER: Detect Complex Attacks Accurately from Traffic, characterization information about the traffic. This rich characterization information provides the basis for accurately identifying attack traffic. Then, to avoid the additional overhead of running a large multi-tasking model and to further improve detection speed, SNIPER distills the shared featu作者: Overthrow 時間: 2025-4-1 18:06
,From the Perspective of Prototypes: A?Privacy-Preserving Personalized Federated Learning Framework,lead to a series of privacy security issues. Furthermore, We propose a privacy-preserving personalized federated learning framework based on prototypes, ingeniously integrating homomorphic encryption technology into the training of prototype federated learning through equivalent transformations, thu作者: 可觸知 時間: 2025-4-1 19:19
,Parallel Implementation of?Sieving Algorithm on?Heterogeneous CPU-GPU Computing Architectures,ieves a minimum speedup of 7.2x (for 30-dimensional SVP) and a maximum of 588x (for 120-dimensional SVP) on Hannibal and a minimum speedup of 4.3x (for 30-dimensional SVP) and a maximum of 1230x (for 120-dimensional SVP) on Zeus.