책 이미지

책 정보
· 분류 : 외국도서 > 컴퓨터 > 네트워킹 > 보안
· ISBN : 9789819709441
· 쪽수 : 419쪽
· 출판일 : 2024-02-25
목차
System Security:?Text Laundering: Mitigating Malicious Features through Knowledge Distillation of Language Foundation Models.-?An Android Malware Detection Method Using Better API Contextual Information.-?TAElog: A Novel Transformer AutoEncoder-based Log Anomaly Detection Method.-?EVFLR: Efficient Vertical Federated Logistic Regression Based on Batch Operation.-?Clustered Federated Learning with Inference Hash Codes based Local Sensitive Hashing.-?TIA: Token Importance Transferable Attack on Vision Transformers.-?Cryptography Engineering:?Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber.-?V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture.-?Cryptanalysis:?Improved Integral Cryptanalysis of Block Ciphers BORON and Khudr.-?Automatic Search of Linear Structure: Applications to Keccak and Ascon.-?Differential-Linear Cryptanalysis of Round-Reduced SPARX-64/128.-?Improved Herrmann-May's Attack with Merging Variables and Lower LLL Bound.-?Full Round Distinguishing and Key-Recovery Attacks on SAND-2.-?Real-time Symbolic Reasoning Framework for Cryptojacking Detection Based on Netflow-plus Analysis.-?Non-malleable Codes from Leakage Resilient Cryptographic Primitives.-?Short paper:?DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy.-?A Practical Multi-Candidate Voting Protocol on Quantum Blockchain Adapted for Various Tally Principles.-?Quantum Augmented Lattice Attack on NTRU with Side Information.-?Quantum Attacks: A View of Data Complexity on Offline Simon's Algorithm.-?FaBFT: Flexible Asynchronous BFT Protocol Using DAG.-?Forward Secure Online/offline Key Policy Attribute-based Encryption with Multi-keyword Search.-?Differential Privacy Enhanced Dynamic Searchable Symmetric Encryption for Cloud Environments.-?Poster:?An Efficient Privacy-preserving Scheme for Weak Password Collection in Internet of Things.-?TRGE: A Backdoor Detection after Quantizatio.-?Improved Homomorphic Evaluation for Hash Function based on TFHE.-?Power of Randomness Recovery: Tightly CCA-Secure KEM in the QROM.-?Partial Key Exposure Attack on Common Prime RSA.-?An Efficient Autonomous Path Proxy Re-Encryption without Pairing for Cloud-assisted mHealth.