Information Security Practice and Experience : 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings /: 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings. (2019)
- Record Type:
- Book
- Title:
- Information Security Practice and Experience : 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings /: 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings. (2019)
- Main Title:
- Information Security Practice and Experience : 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings
- Further Information:
- Note: Swee-Huay Heng, Javier Lopez.
- Editors:
- Heng, Swee-Huay
López, Javier - Contents:
- Cryptography I.- Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model.- A Bitwise Logistic Regression using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme.- Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme.- Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE.- System and Network Security.- KMO : Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism.- Peel the onion: Recognition of Android apps behind the Tor Network.- JSLess: A Tale of a Fileless Javascript Memory-Resident Malware.- Security Protocol and Tool.- A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation.- Secure Best Arm Identification in Multi-Armed Bandits.- CATCHA: When Cats Track Your Movements Online.- Designing a Code Vulnerability Meta-Scanner.- Access Control and Authentication.- Using IFTTT to Express and Enforce UCON Obligations.- Evaluation of Software PUF Based on Gyroscope.- White-Box Implementation of the KMAC Message Authentication Code.- Cryptography II.- Improving Signature Schemes With Tight Security Reductions.- Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings.- Identity-based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios.- Recovering Internal States of Grain-v1.- Data and User Privacy.- GDPR-Compliant Reputation System Based on Self-Certifying Domain Signatures.- Defining a newCryptography I.- Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model.- A Bitwise Logistic Regression using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme.- Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme.- Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE.- System and Network Security.- KMO : Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism.- Peel the onion: Recognition of Android apps behind the Tor Network.- JSLess: A Tale of a Fileless Javascript Memory-Resident Malware.- Security Protocol and Tool.- A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation.- Secure Best Arm Identification in Multi-Armed Bandits.- CATCHA: When Cats Track Your Movements Online.- Designing a Code Vulnerability Meta-Scanner.- Access Control and Authentication.- Using IFTTT to Express and Enforce UCON Obligations.- Evaluation of Software PUF Based on Gyroscope.- White-Box Implementation of the KMAC Message Authentication Code.- Cryptography II.- Improving Signature Schemes With Tight Security Reductions.- Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings.- Identity-based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios.- Recovering Internal States of Grain-v1.- Data and User Privacy.- GDPR-Compliant Reputation System Based on Self-Certifying Domain Signatures.- Defining a new composite cybersecurity rating scheme for SMEs in the U.K..- Privacy Preserving Approach in Dynamic Social Network Data Publishing.- Short Paper I.- Using Freivalds' algorithm to accelerate Lattice-Based Signature Verifications.- Group-based Key Exchange Protocol based on Complete Decomposition Search Problem.- Development Activities, Tools and Techniques of Secure Microservices Compositions.- Generating Phishing Emails Using Graph Database.- Short Paper II.- Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection.- The (Persistent) Threat of Weak Passwords: Implementation of a Semi-Automatic Password-Cracking Algorithm.- A Novel and Comprehensive Evaluation Methodology for SIEM. … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2019
- Copyright Date:
- 2019
- Extent:
- 1 online resource (490 pages)
- Subjects:
- Computer science
Computer security
Data protection
Computer organization
Computers and civilization
Computers -- Security -- General
Computers -- Networking -- General
Computers -- Social Aspects -- General
Computer security
Computer networking & communications
Ethical & social aspects of IT - Languages:
- English
- ISBNs:
- 9783030343392
- Related ISBNs:
- 9783030343385
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.473635
- Ingest File:
- 02_624.xml