Advances in Information and Computer Security: 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8–10, 2021, Proceedings

Author:   Toru Nakanishi ,  Ryo Nojima
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2021
Volume:   12835
ISBN:  

9783030859862


Pages:   253
Publication Date:   27 August 2021
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $181.10 Quantity:  
Add to Cart

Share |

Advances in Information and Computer Security: 16th International Workshop on Security, IWSEC 2021, Virtual Event, September 8–10, 2021, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, Japan in September 2021. The conference was held virtually due to COVID-19 pandemic. The 14 regular papers and 3 short paper presented in this volume were carefully reviewed and selected from 37 submissions. They were organized in topical sections named: Lattice-Based Cryptography; System Security; Multiparty Computation; Machine Learning and Security; Post-quantum Cryptography; Symmetric-key Cryptography; Game Theory and Security.

Full Product Details

Author:   Toru Nakanishi ,  Ryo Nojima
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2021
Volume:   12835
Weight:   0.415kg
ISBN:  

9783030859862


ISBN 10:   303085986
Pages:   253
Publication Date:   27 August 2021
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Lattice-Based Cryptography A trace map attack against special ring-LWE samples.- Shortest Vectors in Lattices of Bai-Galbraith’s Embedding Attack on the LWR Problem.- System Security KPRM: Kernel Page Restriction Mechanism to Prevent Kernel Memory Corruption.- Evidence Collection and Preservation System with Virtual Machine Monitoring.- Multiparty Computation Evolving Homomorphic Secret Sharing for Hierarchical Access Structures.- Machine Learning and Security Understanding Update of Machine-Learning-Based Malware Detection by Clustering Changes in Feature Attributions.- Proposal of Jawi CAPTCHA Using Digraphia Feature of the Malay Language.- Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices.- FFT Program Generation for Ring LWE-based Cryptography.- Symmetric-key Cryptography Optimum Attack on 3-Round Feistel-2 Structure.- Post-quantum Cryptography (2) An Intermediate Secret-Guessing Attack on Hash-Based Signatures.- Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH.- Simple Matrix Signature Scheme.- Game Theory and Security Moving Target Defense for the CloudControl Game.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List