Applied Cryptography and Network Security: 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part IIMauro Conti, Jianying Zhou, Emiliano Casalicchio, Angelo Spognardi Springer Nature, 28 aug 2020 - 478 pagina's This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020.The conference was held virtually due to the COVID-19 pandemic. |
Inhoudsopgave
3 | |
21 | |
BiometricAuthenticated Searchable Encryption | 40 |
A Practical Biometric Authentication Mechanism Based on 3D Fingervein | 62 |
Privacy and Anonymity | 81 |
Accelerating Forward and Backward Private Searchable Encryption Using Trusted Execution | 82 |
ClusterBased Anonymization of Knowledge Graphs | 104 |
Same Point Composable and Nonmalleable Obfuscated Point Functions | 124 |
Malicious Cooperation Between BenignLooking Processes | 254 |
Intrusion Detection | 275 |
Quality Evaluation of Cyber Threat Intelligence Feeds | 276 |
Game TheoryBased Approach for Defense Against APTs | 297 |
Software and System Security | 321 |
GPUAssisted Software Memory Encryption | 323 |
A New Stealthy Rooting Technique on ARM Devices | 344 |
Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables | 364 |
A Concise Bounded Anonymous Broadcast Yielding Combinatorial TraceandRevoke Schemes | 145 |
Secure Communication | 165 |
MultiDevice for Signal | 167 |
On the Cryptographic Deniability of the Signal Protocol | 188 |
Security Analysis | 210 |
Powerless Security | 213 |
An Inspection and Monitoring Toolkit for TR069 6pt | 233 |
Web Security | 385 |
When TLS Meets Proxy on Mobile | 386 |
Human Factors in Homograph Attack Recognition | 408 |
Publicly Evaluatable Perceptual Hashing | 436 |
TrollThrottleRaising the Cost of Astroturfing | 456 |
Author Index | 477 |
Overige edities - Alles bekijken
Applied Cryptography and Network Security: 18th International Conference ... Mauro Conti,Jianying Zhou,Emiliano Casalicchio,Angelo Spognardi Geen voorbeeld beschikbaar - 2020 |
Veelvoorkomende woorden en zinsdelen
able activity additional adversary algorithm ALICE allows analysis anonymized applications approach assume assumption attack authentication behavior binary biometric browsers camera certificates ciphertext client communication compute consider construction cost cryptographic database defined Definition deleted detection device distribution documents domains dynamic effective efficient encryption evaluate execution existing experiments factor feeds fingerprint function given hash homograph identify IEEE images implementation input Italy keyword knowledge LNCS malicious memory method nodes obfuscation operations output parameter participants performed present proposed protect protocol query random ransomware requires root running sample scheme score secret Sect sends server session Signal similarity simulator specific Springer step stored Table takes techniques threat types update vulnerabilities