دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: 1 نویسندگان: Pantelimon Stănică, Sugata Gangopadhyay, Sumit Kumar Debnath سری: Lecture Notes in Electrical Engineering ISBN (شابک) : 9813367806, 9789813367807 ناشر: Springer سال نشر: 2021 تعداد صفحات: 183 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 4 مگابایت
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Security and Privacy: Select Proceedings of ICSP 2020 به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب امنیت و حریم خصوصی: مجموعه مقالات ICSP 2020 را انتخاب کنید نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب شامل مقالات منتخب داوری شده از کنفرانس بینالمللی امنیت و حریم خصوصی - ICSP 2020 است. این کتاب بر روی پیشرفتهای پیشرفته امنیت شبکه، پروتکلهای رمزنگاری امن، رمزنگاری پس کوانتومی، کوانتومی تمرکز دارد. رمزنگاری، زنجیره بلوکی و ارز دیجیتال، امنیت و حریم خصوصی اینترنت اشیا، امنیت ابری، یادگیری ماشینی در امنیت سایبری و سایر رشته های مرتبط با امنیت و حریم خصوصی. در این کتاب، طیف گستردهای از اصول اولیه امنیتی به همراه پیشرفتهای اخیر در برخی از موضوعات پیشرفته مانند رمزگذاری عملکردی، محاسبات دو طرف/چند طرفه، بیتکوین، ارز دیجیتال و امنیت پسا کوانتومی مورد بحث قرار گرفته است.
This book consists of refereed selected papers from the International Conference on Security & Privacy – ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy. In this book, a wide variety of basic security primitives are discussed along with recent developments in some advanced topics like functional encryption, two-party/multi-party computation, bitcoin, cryptocurrency, and post-quantum security.
Organization Committee General Chair: Program Chairs: Technical Program Committee Members: Organizing Committee Chief Patron: Patron: Chairman: Convener & Organizing Secretary: Members: Preface Contents About the Editors A Score-Level Fusion Method for Protecting Fingerprint and Palmprint Templates 1 Introduction 1.1 T-Norm & T-Conorms 2 Related Work 3 Proposed Method 3.1 Binary String Generation from Fingerprint Image 3.2 Palm Print Feature Extraction and Transformation 3.3 Score-Level Fusion 3.4 Transformed Domain Matching 4 Experimental Results & Analysis 4.1 Experimental Setup 4.2 Accuracy 4.3 Security Analysis 5 Conclusion and Future Scope References Combining Human Ear and Profile Face Biometrics for Identity Recognition 1 Introduction 2 Related Work 3 Proposed Multimodal Biometrics Framework 3.1 ROI Extraction 3.2 Preprocessing 3.3 Feature Extraction Using Gabor Filters 3.4 Feature-Level Fusion 3.5 Serial Feature Fusion 4 Experiments 4.1 Datasets 4.2 Result Analysis of the Feature-Level Fusion Using Proposed Methods 4.3 Performance Comparison With Existing Multimodal Ear and Profile Face Approaches 5 Conclusion References Computation And Communication Efficient Chinese Remainder Theorem Based Multi-Party Key Generation Using Modified RSA 1 Introduction 2 Related Work 3 Proposed Model 3.1 Common Key Generation for the Group 3.2 Group Communication 4 Performance Analysis 5 Conclusion and Future Scope References Efficient Random Grid Visual Cryptographic Schemes having Essential Members 1 Introduction 2 Preliminaries 3 Proposed Scheme 3.1 Construction 3.2 Discussion on Light Transmission 3.3 Comparison Among the Schemes Proposed by Wu and Sun ch4WS2012 and Shyu ch4SJShyu2013 4 Experiment and Discussions 5 Conclusion References Further Results on Bent–Negabent Boolean Functions 1 Introduction 2 Preliminaries 3 Secondary Constructions of Bent–Negabent Functions 4 A Secondary Construction Revisited 5 Bent–Negabent Functions From Quadratic Functions 5.1 Generalities 5.2 Secondary Constructions of Bent and Negabent Functions 6 A Characterization of Bent–Negabent Functions Through Their Second-Order Derivatives 7 An Upper Bound on the Sum-of-Squares Indicator σf,g 8 Conclusion References Generalization of Lattice-Based Cryptography on Hypercomplex Algebras 1 Introduction 2 Cryptographic Hierarchies 3 Sedenion Algebra 4 Inverse Associative Property in the Basis Elements of Sedenions 5 Proposed Scheme: STRU 5.1 Successful Decryption 6 Cryptanalysis of STRU 6.1 Brute Force Attack 6.2 Meet-in-the-Middle (MITM) Attacks 6.3 Message Expansion Scheme 6.4 Lattice Attacks 7 Comparative Analysis 8 Conclusion References Health Monitoring of Hydraulic System Using Feature-based Multivariate Time-series Classification Model 1 Introduction 2 Related work 3 Feature-Based Time-Series Classification Model 4 Experimental Results 4.1 Dataset 4.2 Noise Characterization 4.3 Classifier Performance 5 Conclusion References Image Security Using Hyperchaos and Multidimensional Playfair Cipher 1 Introduction 2 Preliminaries 2.1 Multidimensional Playfair Cipher 2.2 Five-dimensional Shimizu–Morioka System (5D-SMS) 3 Proposed Method 3.1 Encryption 3.2 Decryption 4 Statistical Analysis and Experimental Results 4.1 Correlation Coefficient (CC) 4.2 Encryption Quality 4.3 Diffusion Characteristics 4.4 Histogram Analysis 4.5 Key and Search Space Analysis 4.6 Computational Complexity 5 Conclusion References Iris Recognition Using Improved Xor-Sum Code 1 Introduction 2 Related Work 3 Proposed Approach 3.1 Curvature Gabor Filter (CGF) 4 Results and discussion 4.1 IITD Iris Database 4.2 CrossEyed Iris Database 5 Conclusion References Linear Complementary Dual Codes Over mathbbZ2mathbbZ4 1 Introduction 2 LCD Codes Over mathbbZ2mathbbZ4 3 Application on Cryptography 4 Conclusion References Low c-Differential Uniformity for the Gold Function Modified on a Subfield 1 Introduction and Basic Definitions 2 The c-Differential Uniformity of the Subfield Modified Gold Function 3 Concluding Remarks References Post-Quantum Secure Identity-Based Encryption from Multivariate Public Key Cryptography 1 Introduction 2 Our Contribution 3 Preliminaries 3.1 Hardness Assumption 3.2 General Multivariate Encryption ch12patarin1996hidden 3.3 General Identity-Based Encryption ch12gentry2006practical 3.4 CCA Security Model for Identity-Based Encryption ch12boneh2001identity,ch12boneh2003identity 4 Proposed Multivariate Identity-Based Encryption (MU-IBE) 5 Security 6 Complexity 7 Conclusion References Provably Insecure Group Authentication: Not All Security Proofs are What they Claim to Be 1 Introduction 2 The 2013 Harn Scheme 2.1 Goals of the Scheme 2.2 Operation 2.3 Security Claims 3 Analysis of the 2013 Scheme 3.1 Previous Results 3.2 Preliminary Observation 3.3 An Outsider Impersonation Attack 3.4 What About the Security Theorems? 4 The Xia-Harn-Yang-Zhang-Mu-Susilo-Meng Scheme 4.1 Goals of the Scheme 4.2 Operation 4.3 Security Claims 5 Analysis of the ICICS 2019 Scheme 5.1 Preliminary Observation 5.2 An Outsider Impersonation Attack 5.3 Other Possible Attack Scenarios 5.4 What About the Proof of Security? 6 Conclusions References Terahertz Communication: Merits, Demerits, and Future Challenges Regarding 6G Wireless Networks 1 Introduction 2 How Much Data are Secure in 6G 3 Terahertz Communication: Major Technology for 6G 3.1 Why Terahertz Frequencies are so Helpful? 3.2 Innovative Devices for Terahertz Communication 3.3 Merits and Demerits of Terahertz communication 3.4 Health Issues Regarding Terahertz Communication 3.5 Database Security by Using Terahertz 4 Research Challenges 5 Conclusion References Appendix Author Index Author Index