Information Security Practice and Experience
18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24?25, 2023, Proceedings
Series: Lecture Notes in Computer Science; 14341;
- Publisher's listprice EUR 106.99
-
44 374 Ft (42 261 Ft + 5% VAT)
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 20% (cc. 8 875 Ft off)
- Discounted price 35 499 Ft (33 809 Ft + 5% VAT)
Discounted price for customers subscribed to our weekly newsletter.
Subcribe now and take benefit of a favourable price.
Subscribe
Subcribe now and take benefit of a favourable price.
Subscribe
44 374 Ft
Availability
printed on demand
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Edition number 1st ed. 2023
- Publisher Springer Nature Singapore
- Date of Publication 9 November 2023
- Number of Volumes 1 pieces, Book
- ISBN 9789819970315
- Binding Paperback
- No. of pages616 pages
- Size 235x155 mm
- Weight 955 g
- Language English
- Illustrations XIV, 616 p. 157 illus., 114 illus. in color. Illustrations, black & white 502
Categories
Theory of computing, computing in general
System analysis, system planning
Data management in computer systems
Hardware and operating systems in general
System organization
Operating systems and graphical user interfaces
Computer networks in general
Privacy, data security
Theory of computing, computing in general (charity campaign)
System analysis, system planning (charity campaign)
Data management in computer systems (charity campaign)
Hardware and operating systems in general (charity campaign)
System organization (charity campaign)
Operating systems and graphical user interfaces (charity campaign)
Computer networks in general (charity campaign)
Privacy, data security (charity campaign)
Long description:
This book constitutes the refereed proceedings of the 18th International Conference on Information Security Practice and Experience, ISPEC 2023, held in Copenhagen, Denmark, in August 2023.
The 27 full papers and 8 short papers included in this volume were carefully reviewed and selected from 80 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
More
Table of Contents:
Secure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion Recognition.- FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems using Autoencoder-based Latent Space Representations.- Mitigating Sybil Attacks in Federated Learning.- Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics.- Obfuscation padding schemes that minimize Renyi min-entropy for Privacy.- Cross-border Data Security from the Perspective of Risk Assessment.- IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures.- CVAR-FL IoV Intrusion Detection Framework.- Transparent Security Method for Automating IoT Security Assessments.- DIDO: Data Provenance from Restricted TLS 1.3 Websites.- QR-SACP: Quantitative Risk-based Situational Awareness Calculation and Projection through Threat Information Sharing.- Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G.- RTR-Shield: Early Detection of Ransomware using Registry and Trap Files.- MalXCap: A Method for Malware Capability Extraction.- Multimodal Software bug Severity Prediction Based on Sentiment Probability.- Recovering Multi-Prime RSA Keys with Erasures and Errors.- Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example.- Chosen Ciphertext Security for Blind Identity-based Encryption with Certified Identities.- A New Gadget Decomposition Algorithm with Less Noise Growth in HE schemes.- Malicious Player Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations.- Cryptanalysis of Human Identification Protocol with Human-Computable Passwords.- A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS).- A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability.- LocKey: Location-based Key Extraction from the WiFi Environment in the User?s Vicinity.- BAHS: a Blockchain-Aided Hash-based Signature Scheme.- Lever: Making Intensive Validation Practical on Blockchain.- Tikuna: An Ethereum Blockchain Network Security Monitoring System.- Isogeny-based Multi-Signature Scheme.- Security Analysis of WAGE against Division Property based Cube Attack.- When MPC in the Head meets VC.- Quantum Key Distribution as a Service and Its Injection into TLS.- XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph.- XSS attack detection by attention mechanism based on script tags in URLs.- Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning.- SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain.
More
Recently viewed
Perspectives in Neural Systems and Behavior
51 119 HUF
46 007 HUF