Information security and cryptology 16th international conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020 : revised selected papers /
This book constitutes the post-conference proceedings of the 16th International Conference on Information Security and Cryptology, Inscrypt 2020, held in, China, in December 2020. Due the COVID-19, the conference was held online and physical. The 24 full papers presented together with 8 short papers...
Corporate Authors: | Inscrypt (Conference) Guangzhou, China) |
---|---|
Other Authors: | Inscrypt (Conference), Wu, Yongdong,, Yung, Moti,, SpringerLink (Online service) |
Format: | eBook |
Language: | English |
Published: |
Cham :
Springer,
[2021]
|
Physical Description: |
1 online resource (503 pages). |
Series: |
Lecture notes in computer science ;
12612. LNCS sublibrary. Security and cryptology. |
Subjects: |
LEADER | 07207cam a2200925 i 4500 | ||
---|---|---|---|
001 | 1243544093 | ||
003 | OCoLC | ||
005 | 20240223121953.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 210327s2021 sz o 101 0 eng d | ||
019 | |a 1242027175 |a 1249944932 | ||
020 | |a 9783030718527 |q (electronic bk.) | ||
020 | |a 3030718522 |q (electronic bk.) | ||
020 | |z 9783030718510 | ||
020 | |z 3030718514 | ||
024 | 7 | |a 10.1007/978-3-030-71852-7 |2 doi | |
035 | |a (OCoLC)1243544093 |z (OCoLC)1242027175 |z (OCoLC)1249944932 | ||
040 | |a EBLCP |b eng |e rda |e pn |c EBLCP |d GW5XE |d YDX |d OCLCO |d EBLCP |d OCLCF |d LEATE |d OCLCQ |d OCLCO |d COM |d OCLCQ |d OCLCO |d OCLCL | ||
049 | |a COM6 | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
111 | 2 | |a Inscrypt (Conference) |n (16th : |d 2020 : |c Guangzhou, China) | |
245 | 1 | 0 | |a Information security and cryptology : |b 16th international conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020 : revised selected papers / |c Yongdong Wu, Moti Yung (eds.). |
246 | 3 | 0 | |a Inscrypt 2020. |
264 | 1 | |a Cham : |b Springer, |c [2021] | |
300 | |a 1 online resource (503 pages). | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
490 | 1 | |a Lecture notes in computer science ; |v 12612. | |
490 | 1 | |a LNCS sublibrary: SL4 - Security and cryptology. | |
500 | |a International conference proceedings. | ||
500 | |a Includes author index. | ||
520 | |a This book constitutes the post-conference proceedings of the 16th International Conference on Information Security and Cryptology, Inscrypt 2020, held in, China, in December 2020. Due the COVID-19, the conference was held online and physical. The 24 full papers presented together with 8 short papers were carefully reviewed and selected from 79 submissions. The papers presents papers about research advances in all areas of information security, cryptology, and their applications. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Intro -- Preface -- Organization -- Contents -- AI Security -- Polytopic Attack on Round-Reduced Simon32/64 Using Deep Learning -- 1 Introduction -- 2 The Simon Family of Block Ciphers -- 2.1 Notations -- 2.2 A Short Description of Simon -- 2.3 Some Properties of Simon -- 3 Differential Distinguisher Based on Neural Network -- 3.1 Model Structure -- 3.2 Training Model -- 4 Polytope Distinguisher Based on Neural Network -- 4.1 Polytope Differential Neural Network Distinguisher -- 4.2 Result -- 5 Key Recovery on the Final Round -- 5.1 Wrong Key Randomization -- 5.2 Bayesian Optimization. | |
505 | 8 | |a 5.3 Bayesian Key Research -- 5.4 Polytopic Attacks on Simon32/64 -- 5.5 Analysis -- 5.6 Bayesian Key Research with Error -- 6 Conclusion -- References -- DAS-AST: Defending Against Model Stealing Attacks Based on Adaptive Softmax Transformation -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Preliminary -- 3.2 Framework Structure -- 3.3 Adaptive Softmax Transformation -- 4 Experiment and Analysis -- 4.1 Experiment Setup -- 4.2 Defense Evaluation -- 4.3 Defense Comparison -- 4.4 Defense Transferability -- 4.5 Defense Visual Analysis -- 5 Conclusion and Future Works -- References. | |
505 | 8 | |a Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack -- 1 Introduction -- 2 Related Work -- 3 Feint Attack Chains Construction and Detection Method -- 3.1 Alert Correlation Based on Fuzzy Clustering -- 3.2 Building the Virtual-Real Lib -- 3.3 Feint Attack Chain Construction and Detection Model -- 4 Experimental and Results -- 4.1 Experimental Setup -- 4.2 Experimental Result and Evaluation -- 5 Conclusion -- References -- An Illumination Modulation-Based Adversarial Attack Against Automated Face Recognition System -- 1 Introduction -- 2 Related Work -- 3 Proposed Method. | |
505 | 8 | |a 3.1 Rolling Shutter Effect -- 3.2 Attack Scheme -- 3.3 Attack Methods -- 3.4 Threat Model -- 4 Experiments and Results -- 4.1 Experiment Scheme -- 4.2 Experiment for Dlib Face Recognition System -- 4.3 Experiment for DoS Attack -- 4.4 Experiment for Escape Attack -- 5 Conclusion -- References -- Asymmetric Cipher -- Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption -- 1 Introduction -- 2 Preliminaries -- 2.1 Revocable Hierarchical Identity-Based Encryption -- 2.2 Server-Aided Revocable Hierarchical Identity-Based Encryption. | |
505 | 8 | |a 3 Generic Construction of Server-Aided Revocable HIBE with DKER -- 3.1 Generic Construction of SR-IBE -- References -- Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack -- 1 Introduction -- 1.1 Related Work -- 1.2 Paper Organization -- 2 Preliminary -- 2.1 Notations -- 2.2 Definitions -- 3 ABE with Outsourced Decryption -- 3.1 Syntax of OD-ABE -- 3.2 Security Model for OD-ABE -- 4 An OD-CP-ABE Scheme with Full CPA Security -- 4.1 Construction -- 4.2 Security Analysis -- 5 An OD-CP-ABE Scheme with Full CCA Security -- 5.1 -protocol Used in the Schemes -- 5.2 Construction. | |
650 | 0 | |a Computer security |v Congresses. | |
650 | 0 | |a Data encryption (Computer science) |v Congresses. | |
650 | 6 | |a Sécurité informatique |v Congrès. | |
650 | 6 | |a Chiffrement (Informatique) |v Congrès. | |
650 | 7 | |a Computer security. |2 fast. | |
650 | 7 | |a Data encryption (Computer science) |2 fast. | |
655 | 2 | |a Congress. | |
655 | 7 | |a proceedings (reports) |2 aat. | |
655 | 7 | |a Conference papers and proceedings. |2 fast. | |
655 | 7 | |a Conference papers and proceedings. |2 lcgft. | |
655 | 7 | |a Actes de congrès. |2 rvmgf. | |
700 | 1 | |a Wu, Yongdong, |e editor. | |
700 | 1 | |a Yung, Moti, |e editor. | |
710 | 2 | |a SpringerLink (Online service) | |
776 | 0 | 8 | |i Print version: |a Wu, Yongdong. |t Information Security and Cryptology. |d Cham : Springer International Publishing AG, ©2021 |z 9783030718510. |
830 | 0 | |a Lecture notes in computer science ; |v 12612. | |
830 | 0 | |a LNCS sublibrary. |n SL 4, |p Security and cryptology. | |
907 | |a .b64071455 |b multi |c - |d 210427 |e 240401 | ||
998 | |a (3)cue |a cu |b 240227 |c m |d z |e - |f eng |g sz |h 0 |i 2 | ||
948 | |a MARCIVE Overnight, in 2024.03 | ||
948 | |a MARCIVE Comprehensive, in 2023.02 | ||
948 | |a MARCIVE Over, 07/2021 | ||
948 | |a MARCIVE Over, 05/2021 | ||
933 | |a Marcive found issue: "700 1 |a Wu, Yongdong, |e editor." | ||
994 | |a 92 |b COM | ||
995 | |a Loaded with m2btab.ltiac in 2024.03 | ||
995 | |a Loaded with m2btab.elec in 2024.02 | ||
995 | |a Loaded with m2btab.ltiac in 2023.02 | ||
995 | |a Loaded with m2btab.ltiac in 2021.07 | ||
995 | |a Loaded with m2btab.elec in 2021.06 | ||
995 | |a Loaded with m2btab.ltiac in 2021.05 | ||
995 | |a Loaded with m2btab.elec in 2021.04 | ||
995 | |a Loaded with m2btab.auth in 2021.05 | ||
995 | |a Loaded with m2btab.auth in 2021.07 | ||
995 | |a Loaded with m2btab.auth in 2024.03 | ||
999 | |e z | ||
999 | |a cue | ||
989 | |d cueme |e - - |f - - |g - |h 0 |i 0 |j 200 |k 240227 |l $0.00 |m |n - - |o - |p 0 |q 0 |t 0 |x 0 |w SpringerLink |1 .i150728839 |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-030-71852-7 |3 SpringerLink |z Click here for access |