menu
{ "item_title" : "Information Security Applications", "item_author" : [" Ilsun You "], "item_description" : "Show me your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM.- Turn On the Lights: User Behavior in Game Environment Using CPTED.- QR Code Watermarking for Digital Images.- FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking.- DroPPP: A P4 Approach to Mitigating DoS Attacks in SDN.- A Secure and Self-Tallying E-Voting System Based on Blockchain.- An Extended CTRT for AES-256.- A Blind Ring Signature Based on the Short Integer Solution Problem.- A Note on the Invisibility and Anonymity of Undeniable Signature Schemes.- Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR.- Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNSS).- CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network.- A New Password Cracking Model with Generative Adversarial Networks.- Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing.- Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression.- Timed-Release Encryption with Master Time Bound Key.- Is it Possible to Hide My Key into Deep Neural Network.- RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices.- On the Automation of Security Testing for IoT Constrained Scenarios.- Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments.- Secret Sharing on Evolving Multi-Level Access Structure.- Strengthened PAKE Protocols Secure Against Malicious Private Key Generator.- Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof.- Ring-LWE on 8-bit AVR Embedded Processor.- Low-Noise LLC Side-Channel Attack with Perf.- Optimized SIKE Round 2 on 64-bit ARM.- Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea.- An SGX-Based Key Management Framework for Data Centric Networking.- Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR.", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/3/03/039/302/303039302X_b.jpg", "price_data" : { "retail_price" : "54.99", "online_price" : "54.99", "our_price" : "54.99", "club_price" : "54.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Information Security Applications|Ilsun You

Information Security Applications : 20th International Conference, Wisa 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Show me your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM.- Turn On the Lights: User Behavior in Game Environment Using CPTED.- QR Code Watermarking for Digital Images.- FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking.- DroPPP: A P4 Approach to Mitigating DoS Attacks in SDN.- A Secure and Self-Tallying E-Voting System Based on Blockchain.- An Extended CTRT for AES-256.- A Blind Ring Signature Based on the Short Integer Solution Problem.- A Note on the Invisibility and Anonymity of Undeniable Signature Schemes.- Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR.- Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNSS).- CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network.- A New Password Cracking Model with Generative Adversarial Networks.- Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing.- Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression.- Timed-Release Encryption with Master Time Bound Key.- Is it Possible to Hide My Key into Deep Neural Network.- RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices.- On the Automation of Security Testing for IoT Constrained Scenarios.- Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments.- Secret Sharing on Evolving Multi-Level Access Structure.- Strengthened PAKE Protocols Secure Against Malicious Private Key Generator.- Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof.- Ring-LWE on 8-bit AVR Embedded Processor.- Low-Noise LLC Side-Channel Attack with Perf.- Optimized SIKE Round 2 on 64-bit ARM.- Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea.- An SGX-Based Key Management Framework for Data Centric Networking.- Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR.

This item is Non-Returnable

Details

  • ISBN-13: 9783030393021
  • ISBN-10: 303039302X
  • Publisher: Springer
  • Publish Date: January 2020
  • Dimensions: 9.21 x 6.14 x 0.82 inches
  • Shipping Weight: 1.23 pounds
  • Page Count: 384

Related Categories

You May Also Like...

    1

BAM Customer Reviews