Silicon Valley Cybersecurity Conference: First Conference, SVCC 2020, San Jose, CA, USA, December 17–19, 2020, Revised Selected Papers

Author:   Younghee Park ,  Divyesh Jadav ,  Thomas Austin
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2021
Volume:   1383
ISBN:  

9783030727246


Pages:   227
Publication Date:   02 April 2021
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Silicon Valley Cybersecurity Conference: First Conference, SVCC 2020, San Jose, CA, USA, December 17–19, 2020, Revised Selected Papers


Add your own review!

Overview

Full Product Details

Author:   Younghee Park ,  Divyesh Jadav ,  Thomas Austin
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2021
Volume:   1383
Weight:   0.454kg
ISBN:  

9783030727246


ISBN 10:   3030727246
Pages:   227
Publication Date:   02 April 2021
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Dynamic Security Analysis of Zoom, Google Meet and Microsoft Teams.- A Secure Encapsulation Schemes based on Key Recovery System.- Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator.- STRISA: A New Regulation Architecture to Enforce Travel Rule.- Post-Quantum Hash-Based Signatures for Secure Boot.- Exploring the Coverage of Existing Hardware Vulnerabilities in Community Standards.- MurQRI: Encrypted Multi-Layer QR Codes for Electronic Identity Management.- SpartanGold: A Blockchain for Education, Experimentation, and Rapid Prototyping.- BIOT: A blockchain-based IoT Platform for Distributed Energy Resource Management.- A Privacy Preserving E-voting System based on Blockchain.- Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity.- ConTheModel: Can we modify tweets to confuse classifier models?.- A Systematic Approach to Building Autoencoders for Intrusion Detection.- An Attack on Quantum Circuits Based on the Error Rates of NISQ Systems and a Countermeasure.- Cryptocurrency with Multiple Sequence Alignment Proof-of-Work.- IoT Checker Using Timing Side-channel and Machine Learning.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List