Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/informatique/information-security/descriptif_4819661
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=4819661

Information Security, 1st ed. 2022 25th International Conference, ISC 2022, Bali, Indonesia, December 18–22, 2022, Proceedings Lecture Notes in Computer Science Series, Vol. 13640

Langue : Anglais

Coordonnateurs : Susilo Willy, Chen Xiaofeng, Guo Fuchun, Zhang Yudi, Intan Rolly

Couverture de l’ouvrage Information Security
This book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022.

The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.

Cryptography.- Privacy Preserving Computation in Cloud Using Reusable Garbled Oblivious RAMs.- Efficient Private Set Intersection Cardinality Protocol in the Reverse Unbalanced Setting.- Crypto-Steganographic Validity for Additive Manufacturing (3D Printing) Design Files.- Witness Encryption from Smooth Projective Hashing System.- Post-Quantum Cryptography.- More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model.- QUIC Protocol with Post-Quantum Authentication.- Batched Fully Homomorphic Encryption from TFHE.- Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization.- Cryptanalysis.- Further Cryptanalysis of a Type of RSA Variants.- The SAT-Based Automatic Searching and Experimental Verification for Differential Characteristics with Application to Midori64.- Efficient Scalar Multiplication on Koblitz Curves with Pre-computation.- Blockchain.- Efficient ECDSA-based Adaptor Signature for Batched Atomic Swaps.- Searching for Encrypted Data on Blockchain: An Efficient, Secure and Fair Realization.- GRUZ : Practical Resource Fair Exchange without Blockchain.- Daric: A Storage Efficient Payment Channel With Punishment Mechanism.- A Blockchain-based Mutual Authentication Protocol for Smart Home.- Email and Web Security.- OblivSend: Secure and Ephemeral File Sharing Services with Oblivious Expiration Control.- EarlyCrow: Detecting APT Malware Command and Control Over HTTP(S) Using Contextual Summaries.- Malware.- ATLAS: A Practical Attack Detection and Live Malware Analysis System for IoT Threat Intelligence.- Dissecting Applications Uninstallers & Removers: Are they effective?.- Representing LLVM-IR in a Code Property Graph.- Why we need a theory of maliciousness: Hardware Performance Counters in security.- Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination With Whole-system Replay.- AI Security.- AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition.- HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud.- Deep Learning Assisted Key Recovery Attack for Round-Reduced Simeck32/64.- CFL: Cluster Federated Learning in Large-scale Peer-to-Peer Networks.- Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing.- Communication-Efficient and Secure Federated Learning Based on Adaptive
One-bit Compressed Sensing.