Information Security and Cryptology - ICISC 2023 [E-Book] : 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part II / edited by Hwajeong Seo, Suhri Kim.
This book constitutes the refereed proceedings of the 26th International Conference on Information Security and Cryptology on Information Security and Cryptology - ICISC 2023, held in Seoul, South Korea, during November 29-December 1, 2023 The 31 full papers included in this book were carefully revi...
Saved in:
Full text |
|
Personal Name(s): | Kim, Suhri, editor |
Seo, Hwajeong, editor | |
Edition: |
1st edition 2024. |
Imprint: |
Singapore :
Springer,
2024
|
Physical Description: |
XIV, 308 pages 81 illustrations, 32 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9789819712380 |
DOI: |
10.1007/978-981-97-1238-0 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Lecture Notes in Computer Science ;
14562 |
Subject (LOC): |
- Cyber Security
- A Comparative Analysis of Rust-Based SGX Frameworks: Implications for building SGX applications
- BTFuzzer: a profile-based fuzzing framework for Bluetooth protocols
- mdTLS: How to make middlebox-aware TLS more efficient?
- PHI: Pseudo-HAL Identification for Scalable Firmware Fuzzing
- Lightweight Anomaly Detection Mechanism based on Machine Learning Using Low-Cost Surveillance Cameras
- Applied Cryptography
- Enhancing Prediction Entropy Estimation of RNG for On-the-Fly Test
- Leakage-Resilient Attribute-based Encryption with Attribute-hiding
- Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners
- Single-Shuffle Card-Based Protocols with Six Cards per Gate
- Efficient Result-Hiding Searchable Encryption with Forward and Backward Privacy
- Finsler Encryption
- Feasibility Analysis and Performance Optimization of the Conflict Test Algorithms for Searching Eviction Set
- Korean Post Quantum Cryptography
- Theoretical and Empirical Analysis of FALCON and SOLMAE using their Python Implementation
- Security Evaluation on KpqC Round 1 Lattice-based Algorithms Using Lattice Estimator
- On the security of REDOG.