Description |
1 online resource (503 pages) |
Series |
Lecture notes in computer science ; 12612 |
|
LNCS sublibrary: SL4 - Security and cryptology |
|
Lecture notes in computer science ; 12612.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Intro -- Preface -- Organization -- Contents -- AI Security -- Polytopic Attack on Round-Reduced Simon32/64 Using Deep Learning -- 1 Introduction -- 2 The Simon Family of Block Ciphers -- 2.1 Notations -- 2.2 A Short Description of Simon -- 2.3 Some Properties of Simon -- 3 Differential Distinguisher Based on Neural Network -- 3.1 Model Structure -- 3.2 Training Model -- 4 Polytope Distinguisher Based on Neural Network -- 4.1 Polytope Differential Neural Network Distinguisher -- 4.2 Result -- 5 Key Recovery on the Final Round -- 5.1 Wrong Key Randomization -- 5.2 Bayesian Optimization |
|
5.3 Bayesian Key Research -- 5.4 Polytopic Attacks on Simon32/64 -- 5.5 Analysis -- 5.6 Bayesian Key Research with Error -- 6 Conclusion -- References -- DAS-AST: Defending Against Model Stealing Attacks Based on Adaptive Softmax Transformation -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Preliminary -- 3.2 Framework Structure -- 3.3 Adaptive Softmax Transformation -- 4 Experiment and Analysis -- 4.1 Experiment Setup -- 4.2 Defense Evaluation -- 4.3 Defense Comparison -- 4.4 Defense Transferability -- 4.5 Defense Visual Analysis -- 5 Conclusion and Future Works -- References |
|
Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack -- 1 Introduction -- 2 Related Work -- 3 Feint Attack Chains Construction and Detection Method -- 3.1 Alert Correlation Based on Fuzzy Clustering -- 3.2 Building the Virtual-Real Lib -- 3.3 Feint Attack Chain Construction and Detection Model -- 4 Experimental and Results -- 4.1 Experimental Setup -- 4.2 Experimental Result and Evaluation -- 5 Conclusion -- References -- An Illumination Modulation-Based Adversarial Attack Against Automated Face Recognition System -- 1 Introduction -- 2 Related Work -- 3 Proposed Method |
|
3.1 Rolling Shutter Effect -- 3.2 Attack Scheme -- 3.3 Attack Methods -- 3.4 Threat Model -- 4 Experiments and Results -- 4.1 Experiment Scheme -- 4.2 Experiment for Dlib Face Recognition System -- 4.3 Experiment for DoS Attack -- 4.4 Experiment for Escape Attack -- 5 Conclusion -- References -- Asymmetric Cipher -- Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption -- 1 Introduction -- 2 Preliminaries -- 2.1 Revocable Hierarchical Identity-Based Encryption -- 2.2 Server-Aided Revocable Hierarchical Identity-Based Encryption |
|
3 Generic Construction of Server-Aided Revocable HIBE with DKER -- 3.1 Generic Construction of SR-IBE -- References -- Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack -- 1 Introduction -- 1.1 Related Work -- 1.2 Paper Organization -- 2 Preliminary -- 2.1 Notations -- 2.2 Definitions -- 3 ABE with Outsourced Decryption -- 3.1 Syntax of OD-ABE -- 3.2 Security Model for OD-ABE -- 4 An OD-CP-ABE Scheme with Full CPA Security -- 4.1 Construction -- 4.2 Security Analysis -- 5 An OD-CP-ABE Scheme with Full CCA Security -- 5.1 -protocol Used in the Schemes -- 5.2 Construction |
Summary |
This book constitutes the post-conference proceedings of the 16th International Conference on Information Security and Cryptology, Inscrypt 2020, held in, China, in December 2020. Due the COVID-19, the conference was held online and physical. The 24 full papers presented together with 8 short papers were carefully reviewed and selected from 79 submissions. The papers presents papers about research advances in all areas of information security, cryptology, and their applications |
Notes |
International conference proceedings |
|
Includes author index |
|
Print version record |
Subject |
Computer security -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Wu, Yongdong, editor
|
|
Yung, Moti, editor.
|
ISBN |
9783030718527 |
|
3030718522 |
|