Limit search to available items
Book Cover
E-book
Author Inscrypt (Conference) (16th : 2020 : Guangzhou, China)

Title Information security and cryptology : 16th international conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020 : revised selected papers / Yongdong Wu, Moti Yung (eds.)
Published Cham : Springer, [2021]

Copies

Description 1 online resource (503 pages)
Series Lecture notes in computer science ; 12612
LNCS sublibrary: SL4 - Security and cryptology
Lecture notes in computer science ; 12612.
LNCS sublibrary. SL 4, Security and cryptology.
Contents Intro -- Preface -- Organization -- Contents -- AI Security -- Polytopic Attack on Round-Reduced Simon32/64 Using Deep Learning -- 1 Introduction -- 2 The Simon Family of Block Ciphers -- 2.1 Notations -- 2.2 A Short Description of Simon -- 2.3 Some Properties of Simon -- 3 Differential Distinguisher Based on Neural Network -- 3.1 Model Structure -- 3.2 Training Model -- 4 Polytope Distinguisher Based on Neural Network -- 4.1 Polytope Differential Neural Network Distinguisher -- 4.2 Result -- 5 Key Recovery on the Final Round -- 5.1 Wrong Key Randomization -- 5.2 Bayesian Optimization
5.3 Bayesian Key Research -- 5.4 Polytopic Attacks on Simon32/64 -- 5.5 Analysis -- 5.6 Bayesian Key Research with Error -- 6 Conclusion -- References -- DAS-AST: Defending Against Model Stealing Attacks Based on Adaptive Softmax Transformation -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Preliminary -- 3.2 Framework Structure -- 3.3 Adaptive Softmax Transformation -- 4 Experiment and Analysis -- 4.1 Experiment Setup -- 4.2 Defense Evaluation -- 4.3 Defense Comparison -- 4.4 Defense Transferability -- 4.5 Defense Visual Analysis -- 5 Conclusion and Future Works -- References
Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack -- 1 Introduction -- 2 Related Work -- 3 Feint Attack Chains Construction and Detection Method -- 3.1 Alert Correlation Based on Fuzzy Clustering -- 3.2 Building the Virtual-Real Lib -- 3.3 Feint Attack Chain Construction and Detection Model -- 4 Experimental and Results -- 4.1 Experimental Setup -- 4.2 Experimental Result and Evaluation -- 5 Conclusion -- References -- An Illumination Modulation-Based Adversarial Attack Against Automated Face Recognition System -- 1 Introduction -- 2 Related Work -- 3 Proposed Method
3.1 Rolling Shutter Effect -- 3.2 Attack Scheme -- 3.3 Attack Methods -- 3.4 Threat Model -- 4 Experiments and Results -- 4.1 Experiment Scheme -- 4.2 Experiment for Dlib Face Recognition System -- 4.3 Experiment for DoS Attack -- 4.4 Experiment for Escape Attack -- 5 Conclusion -- References -- Asymmetric Cipher -- Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption -- 1 Introduction -- 2 Preliminaries -- 2.1 Revocable Hierarchical Identity-Based Encryption -- 2.2 Server-Aided Revocable Hierarchical Identity-Based Encryption
3 Generic Construction of Server-Aided Revocable HIBE with DKER -- 3.1 Generic Construction of SR-IBE -- References -- Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack -- 1 Introduction -- 1.1 Related Work -- 1.2 Paper Organization -- 2 Preliminary -- 2.1 Notations -- 2.2 Definitions -- 3 ABE with Outsourced Decryption -- 3.1 Syntax of OD-ABE -- 3.2 Security Model for OD-ABE -- 4 An OD-CP-ABE Scheme with Full CPA Security -- 4.1 Construction -- 4.2 Security Analysis -- 5 An OD-CP-ABE Scheme with Full CCA Security -- 5.1 -protocol Used in the Schemes -- 5.2 Construction
Summary This book constitutes the post-conference proceedings of the 16th International Conference on Information Security and Cryptology, Inscrypt 2020, held in, China, in December 2020. Due the COVID-19, the conference was held online and physical. The 24 full papers presented together with 8 short papers were carefully reviewed and selected from 79 submissions. The papers presents papers about research advances in all areas of information security, cryptology, and their applications
Notes International conference proceedings
Includes author index
Print version record
Subject Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Computer security
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Wu, Yongdong, editor
Yung, Moti, editor.
ISBN 9783030718527
3030718522
Other Titles Inscrypt 2020