Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    b3kat_BV050116759
    Format: 1 Online-Ressource (x, 318 Seiten) , Illustrationen
    ISBN: 9783031804083
    Series Statement: Lecture notes in computer science 15351
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-80407-6
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-031-80409-0
    Language: English
    Keywords: Wissensextraktion ; Privatsphäre ; Anonymisierung ; Datensatz ; Datensicherung ; Codierungstheorie ; Informationstheorie ; Kryptologie ; Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Knechtel, Johann 1986-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almafu_9961806464402883
    Format: 1 online resource (329 pages)
    Edition: 1st ed. 2025.
    ISBN: 9783031804083 , 3031804082
    Series Statement: Lecture Notes in Computer Science, 15351
    Content: This book constitutes the refereed proceedings of the 14th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2024, held in Kottayam, India, during December 14–17, 2024. The 8 full papers, 10 short papers and 1 invited paper included in this book were carefully reviewed and selected from 43 submissions. They were organized in topical sections as follows: security, privacy, applied cryptographic engineering, integration of machine learning techniques, reflecting the growing prominence of this approach in contemporary research on security and cryptography, hardware security, the exploration of post-quantum cryptography, and the development of efficient implementations for emerging cryptographic primitives.
    Note: -- Attacks and Countermeasures for Digital Microfluidic Biochips. -- SideLink: Exposing NVLink to Covert- and Side-Channel Attacks. -- Faster and more Energy-Efficient Equation Solvers over GF(2). -- Transferability of Evasion Attacks Against FHE Encrypted Inference. -- Security Analysis of ASCON Cipher under Persistent Faults. -- Privacy-Preserving Graph-Based Machine Learning with Fully Homomorphic Encryption for Collaborative Anti-Money Laundering. -- CoPrIME: Complete Process Isolation using Memory Encryption. -- Online Testing Entropy and Entropy Tests with a Two State Markov Model. -- DLShield: A Defense Approach against Dirty Label Attacks in Heterogeneous Federated Learning. -- Benchmarking Backdoor Attacks on Graph Convolution Neural Networks: A Comprehensive Analysis of Poisoning Techniques. -- Spatiotemporal Intrusion Detection Systems for IoT Networks. -- High Speed High Assurance implementations of Mutivariate Quadratic based Signatures. -- ”There’s always another counter”: Detecting Micro-architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting. -- FPGA-Based Acceleration of Homomorphic Convolution with Plaintext Kernels. -- Post-Quantum Multi-Client Conjunctive Searchable Symmetric Encryption from Isogenies. -- BlockDoor: Blocking Backdoor Based Watermarks in Deep Neural Networks. -- Adversarial Malware Detection. -- ML based Improved Differential Distinguisher with High Accuracy: Application to GIFT-128 and ASCON.
    Additional Edition: ISBN 9783031804076
    Additional Edition: ISBN 3031804074
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9949930855802882
    Format: X, 318 p. 105 illus., 79 illus. in color. , online resource.
    Edition: 1st ed. 2025.
    ISBN: 9783031804083
    Series Statement: Lecture Notes in Computer Science, 15351
    Content: This book constitutes the refereed proceedings of the 14th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2024, held in Kottayam, India, during December 14-17, 2024. The 8 full papers, 10 short papers and 1 invited paper included in this book were carefully reviewed and selected from 43 submissions. They were organized in topical sections as follows: security, privacy, applied cryptographic engineering, integration of machine learning techniques, reflecting the growing prominence of this approach in contemporary research on security and cryptography, hardware security, the exploration of post-quantum cryptography, and the development of efficient implementations for emerging cryptographic primitives.
    Note: -- Attacks and Countermeasures for Digital Microfluidic Biochips. -- SideLink: Exposing NVLink to Covert- and Side-Channel Attacks. -- Faster and more Energy-Efficient Equation Solvers over GF(2). -- Transferability of Evasion Attacks Against FHE Encrypted Inference. -- Security Analysis of ASCON Cipher under Persistent Faults. -- Privacy-Preserving Graph-Based Machine Learning with Fully Homomorphic Encryption for Collaborative Anti-Money Laundering. -- CoPrIME: Complete Process Isolation using Memory Encryption. -- Online Testing Entropy and Entropy Tests with a Two State Markov Model. -- DLShield: A Defense Approach against Dirty Label Attacks in Heterogeneous Federated Learning. -- Benchmarking Backdoor Attacks on Graph Convolution Neural Networks: A Comprehensive Analysis of Poisoning Techniques. -- Spatiotemporal Intrusion Detection Systems for IoT Networks. -- High Speed High Assurance implementations of Mutivariate Quadratic based Signatures. -- "There's always another counter": Detecting Micro-architectural Attacks in a Probabilistically Interleaved Malicious/Benign Setting. -- FPGA-Based Acceleration of Homomorphic Convolution with Plaintext Kernels. -- Post-Quantum Multi-Client Conjunctive Searchable Symmetric Encryption from Isogenies. -- BlockDoor: Blocking Backdoor Based Watermarks in Deep Neural Networks. -- Adversarial Malware Detection. -- ML based Improved Differential Distinguisher with High Accuracy: Application to GIFT-128 and ASCON.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783031804076
    Additional Edition: Printed edition: ISBN 9783031804090
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 303180404?
Did you mean 3031803078?
Did you mean 3031086074?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages