Information security and cryptology 16th international conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020 : revised selected papers /

This book constitutes the post-conference proceedings of the 16th International Conference on Information Security and Cryptology, Inscrypt 2020, held in, China, in December 2020. Due the COVID-19, the conference was held online and physical. The 24 full papers presented together with 8 short papers...

Full description

Corporate Authors: Inscrypt (Conference) Guangzhou, China)
Other Authors: Inscrypt (Conference), Wu, Yongdong,, Yung, Moti,, SpringerLink (Online service)
Format: eBook
Language: English
Published: Cham : Springer, [2021]
Physical Description: 1 online resource (503 pages).
Series: Lecture notes in computer science ; 12612.
LNCS sublibrary. Security and cryptology.
Subjects:
LEADER 07207cam a2200925 i 4500
001 1243544093
003 OCoLC
005 20240223121953.0
006 m o d
007 cr cnu---unuuu
008 210327s2021 sz o 101 0 eng d
019 |a 1242027175  |a 1249944932 
020 |a 9783030718527  |q (electronic bk.) 
020 |a 3030718522  |q (electronic bk.) 
020 |z 9783030718510 
020 |z 3030718514 
024 7 |a 10.1007/978-3-030-71852-7  |2 doi 
035 |a (OCoLC)1243544093  |z (OCoLC)1242027175  |z (OCoLC)1249944932 
040 |a EBLCP  |b eng  |e rda  |e pn  |c EBLCP  |d GW5XE  |d YDX  |d OCLCO  |d EBLCP  |d OCLCF  |d LEATE  |d OCLCQ  |d OCLCO  |d COM  |d OCLCQ  |d OCLCO  |d OCLCL 
049 |a COM6 
050 4 |a QA76.9.A25 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
111 2 |a Inscrypt (Conference)  |n (16th :  |d 2020 :  |c Guangzhou, China) 
245 1 0 |a Information security and cryptology :  |b 16th international conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020 : revised selected papers /  |c Yongdong Wu, Moti Yung (eds.). 
246 3 0 |a Inscrypt 2020. 
264 1 |a Cham :  |b Springer,  |c [2021] 
300 |a 1 online resource (503 pages). 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
490 1 |a Lecture notes in computer science ;  |v 12612. 
490 1 |a LNCS sublibrary: SL4 - Security and cryptology. 
500 |a International conference proceedings. 
500 |a Includes author index. 
520 |a This book constitutes the post-conference proceedings of the 16th International Conference on Information Security and Cryptology, Inscrypt 2020, held in, China, in December 2020. Due the COVID-19, the conference was held online and physical. The 24 full papers presented together with 8 short papers were carefully reviewed and selected from 79 submissions. The papers presents papers about research advances in all areas of information security, cryptology, and their applications. 
588 0 |a Print version record. 
505 0 |a Intro -- Preface -- Organization -- Contents -- AI Security -- Polytopic Attack on Round-Reduced Simon32/64 Using Deep Learning -- 1 Introduction -- 2 The Simon Family of Block Ciphers -- 2.1 Notations -- 2.2 A Short Description of Simon -- 2.3 Some Properties of Simon -- 3 Differential Distinguisher Based on Neural Network -- 3.1 Model Structure -- 3.2 Training Model -- 4 Polytope Distinguisher Based on Neural Network -- 4.1 Polytope Differential Neural Network Distinguisher -- 4.2 Result -- 5 Key Recovery on the Final Round -- 5.1 Wrong Key Randomization -- 5.2 Bayesian Optimization. 
505 8 |a 5.3 Bayesian Key Research -- 5.4 Polytopic Attacks on Simon32/64 -- 5.5 Analysis -- 5.6 Bayesian Key Research with Error -- 6 Conclusion -- References -- DAS-AST: Defending Against Model Stealing Attacks Based on Adaptive Softmax Transformation -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Preliminary -- 3.2 Framework Structure -- 3.3 Adaptive Softmax Transformation -- 4 Experiment and Analysis -- 4.1 Experiment Setup -- 4.2 Defense Evaluation -- 4.3 Defense Comparison -- 4.4 Defense Transferability -- 4.5 Defense Visual Analysis -- 5 Conclusion and Future Works -- References. 
505 8 |a Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack -- 1 Introduction -- 2 Related Work -- 3 Feint Attack Chains Construction and Detection Method -- 3.1 Alert Correlation Based on Fuzzy Clustering -- 3.2 Building the Virtual-Real Lib -- 3.3 Feint Attack Chain Construction and Detection Model -- 4 Experimental and Results -- 4.1 Experimental Setup -- 4.2 Experimental Result and Evaluation -- 5 Conclusion -- References -- An Illumination Modulation-Based Adversarial Attack Against Automated Face Recognition System -- 1 Introduction -- 2 Related Work -- 3 Proposed Method. 
505 8 |a 3.1 Rolling Shutter Effect -- 3.2 Attack Scheme -- 3.3 Attack Methods -- 3.4 Threat Model -- 4 Experiments and Results -- 4.1 Experiment Scheme -- 4.2 Experiment for Dlib Face Recognition System -- 4.3 Experiment for DoS Attack -- 4.4 Experiment for Escape Attack -- 5 Conclusion -- References -- Asymmetric Cipher -- Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption -- 1 Introduction -- 2 Preliminaries -- 2.1 Revocable Hierarchical Identity-Based Encryption -- 2.2 Server-Aided Revocable Hierarchical Identity-Based Encryption. 
505 8 |a 3 Generic Construction of Server-Aided Revocable HIBE with DKER -- 3.1 Generic Construction of SR-IBE -- References -- Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack -- 1 Introduction -- 1.1 Related Work -- 1.2 Paper Organization -- 2 Preliminary -- 2.1 Notations -- 2.2 Definitions -- 3 ABE with Outsourced Decryption -- 3.1 Syntax of OD-ABE -- 3.2 Security Model for OD-ABE -- 4 An OD-CP-ABE Scheme with Full CPA Security -- 4.1 Construction -- 4.2 Security Analysis -- 5 An OD-CP-ABE Scheme with Full CCA Security -- 5.1 -protocol Used in the Schemes -- 5.2 Construction. 
650 0 |a Computer security  |v Congresses. 
650 0 |a Data encryption (Computer science)  |v Congresses. 
650 6 |a Sécurité informatique  |v Congrès. 
650 6 |a Chiffrement (Informatique)  |v Congrès. 
650 7 |a Computer security.  |2 fast. 
650 7 |a Data encryption (Computer science)  |2 fast. 
655 2 |a Congress. 
655 7 |a proceedings (reports)  |2 aat. 
655 7 |a Conference papers and proceedings.  |2 fast. 
655 7 |a Conference papers and proceedings.  |2 lcgft. 
655 7 |a Actes de congrès.  |2 rvmgf. 
700 1 |a Wu, Yongdong,  |e editor. 
700 1 |a Yung, Moti,  |e editor. 
710 2 |a SpringerLink (Online service) 
776 0 8 |i Print version:  |a Wu, Yongdong.  |t Information Security and Cryptology.  |d Cham : Springer International Publishing AG, ©2021  |z 9783030718510. 
830 0 |a Lecture notes in computer science ;  |v 12612. 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology. 
907 |a .b64071455  |b multi  |c -  |d 210427  |e 240401 
998 |a (3)cue  |a cu  |b 240227  |c m  |d z   |e -  |f eng  |g sz   |h 0  |i 2 
948 |a MARCIVE Overnight, in 2024.03 
948 |a MARCIVE Comprehensive, in 2023.02 
948 |a MARCIVE Over, 07/2021 
948 |a MARCIVE Over, 05/2021 
933 |a Marcive found issue: "700 1   |a Wu, Yongdong,  |e editor." 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.elec in 2024.02 
995 |a Loaded with m2btab.ltiac in 2023.02 
995 |a Loaded with m2btab.ltiac in 2021.07 
995 |a Loaded with m2btab.elec in 2021.06 
995 |a Loaded with m2btab.ltiac in 2021.05 
995 |a Loaded with m2btab.elec in 2021.04 
995 |a Loaded with m2btab.auth in 2021.05 
995 |a Loaded with m2btab.auth in 2021.07 
995 |a Loaded with m2btab.auth in 2024.03 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240227  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i150728839  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-030-71852-7  |3 SpringerLink  |z Click here for access