Get Free Shipping on orders over $79
Information Security : 24th International Conference, ISC 2021, Virtual Event, November 10-12, 2021, Proceedings - Joseph K. Liu

Information Security

24th International Conference, ISC 2021, Virtual Event, November 10-12, 2021, Proceedings

By: Joseph K. Liu (Editor), Willy Susilo (Editor), Weizhi Meng (Editor), Sokratis Katsikas (Editor), Rolly Intan (Editor)

Paperback | 27 November 2021

At a Glance

Paperback


$129.00

or 4 interest-free payments of $32.25 with

 or 

Ships in 7 to 10 business days

Cryptology.- Integer LWE with Non-Subgaussian Error and Related Attacks.- Layering Quantum-Resistance into Classical Digital Signature Algorithms.- Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits.- Cryptanalysis of Two White-Box Implementations of the SM4 Block Cipher.- A Non-Interactive Multi-User Protocol for Private Authorised Query Processing on Genomic Data.- Bigdata-facilitated Two-party Authenticated Key Exchange for IoT.- Randomized Component Based Secure Secret Reconstruction in Insecure Networks.- Transparency order of (n,m)-functions - its further characterization and applications.- Web and OS security.- Browserprint: An Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy.- TridentShell: A Covert and Scalable Backdoor Injection.- Andromeda: Enabling Secure Enclaves For The Android Ecosystem.- Network security.- FEX - A feature extractor for real-time IDS.- Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification.- Detection of malware, attacks and vulnerabilities.- Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic.- A Novel Behavioural Screenlogger Detection System.- DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning.- DVul-WLG: Graph Embedding Network Based on Code Similarity for Cross-architecture Firmware Vulnerability Detection.- Machine learning for security.- Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks.- Targeted Universal Adversarial Perturbations for Automatic Speech Recognition.- Voxstructor: Voice Reconstruction from Voiceprint.- Word-Map: Using Community Detection Algorithm to Detect AGDs.

More in Computer Security

Careless People : A story of where I used to work - Sarah Wynn-Williams

RRP $24.99

$21.75

13%
OFF
Computer Security : Art and Science - Dariel Wyatt
Foundations of Information Security - Liam Lewis
Mindf*ck : Inside Cambridge Analytica's Plot to Break the World - Profile Books
Supremacy : AI, ChatGPT and the Race that Will Change the World - Parmy Olson
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Blockchain : Blueprint for a New Economy - Melanie Swa

RRP $66.75

$30.99

54%
OFF
Grey Area : Dark Web Data Collection and the Future of OSINT - Vinny Troia
Cybercrime and Digital Forensics : 3rd Edition - An Introduction - Thomas Holt
Principles of Information Security : 7th edition - Michael E. Whitman

RRP $167.95

$129.99

23%
OFF
Hacking For Dummies : For Dummies (Computer/Tech) - Kevin Beaver

RRP $49.95

$34.97

30%
OFF
Hackers & Painters - Paul Graham

RRP $47.75

$26.75

44%
OFF
Threat Modeling : A Practical Guide for Development Teams - Izar Tarandach