001440664 000__ 05020cam\a2200673\i\4500 001440664 001__ 1440664 001440664 003__ OCoLC 001440664 005__ 20230309004654.0 001440664 006__ m\\\\\o\\d\\\\\\\\ 001440664 007__ cr\un\nnnunnun 001440664 008__ 211101s2021\\\\sz\a\\\\o\\\\\101\0\eng\d 001440664 019__ $$a1281244235$$a1281586211$$a1281961454$$a1287767878$$a1292517883 001440664 020__ $$a9783030894320$$q(electronic bk.) 001440664 020__ $$a3030894320$$q(electronic bk.) 001440664 020__ $$z9783030894313 001440664 020__ $$z3030894312 001440664 0247_ $$a10.1007/978-3-030-89432-0$$2doi 001440664 035__ $$aSP(OCoLC)1281650488 001440664 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dEBLCP$$dDCT$$dOCLCF$$dDKU$$dOCLCO$$dOCLCQ$$dOCLCO$$dOCLCQ 001440664 049__ $$aISEA 001440664 050_4 $$aQA76.9.A25$$b.W57 2021 001440664 08204 $$a005.8$$223 001440664 1112_ $$aWISA (Workshop : Information security)$$n(22nd :$$d2021 :$$cCheju Island, Korea) 001440664 24510 $$aInformation security applications :$$b22nd international conference, WISA 2021, Jeju Island, South Korea, August 11-13, 2021 : revised selected papers /$$cHyoungshick Kim (ed.). 001440664 24630 $$aWISA 2021 001440664 264_1 $$aCham :$$bSpringer,$$c[2021] 001440664 264_4 $$c©2021 001440664 300__ $$a1 online resource :$$billustrations (chiefly color) 001440664 336__ $$atext$$btxt$$2rdacontent 001440664 337__ $$acomputer$$bc$$2rdamedia 001440664 338__ $$aonline resource$$bcr$$2rdacarrier 001440664 347__ $$atext file 001440664 347__ $$bPDF 001440664 4901_ $$aLecture notes in computer science ;$$v13009 001440664 4901_ $$aLNCS sublibrary: SL4 - Security and cryptology 001440664 500__ $$aInternational conference proceedings. 001440664 500__ $$aIncludes author index. 001440664 5050_ $$aMachine Learning Security -- LOM: Lightweight classifier for obfuscation methods -- A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection -- Unsupervised Driver Behavior Profiling leveraging Recurrent Neural Networks -- On the robustness of intrusion detection systems for vehicles against adversarial attacks -- A Framework for Generating Evasion Attacks for Machine Learning based Network Intrusion Detection Systems -- Echo-Guard : Acoustic-based Anomaly Detection System for Smart Manufacturing Environments -- Research on improvement of anomaly detection performance in industrial control systems -- Cryptography -- Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem -- Anonymous IBE from PEKS : A Generic Construction -- Secure Computation of Shared Secrets and Its Applications -- Pattern Matching over Encrypted Data with a Short Ciphertext -- Efficient adaptation of TFHE for high end-to-end throughput -- AnyTRNG: Generic, High-throughput, Low-area True Random Number Generator based on Synchronous Edge Sampling -- Hardware Security -- Masked Implementation of PIPO Block Cipher on 8-bit AVR Microcontrollers -- Parallel Implementation of PIPO Block Cipher on 32-bit RISC-V Processor -- No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms -- ARMed Frodo: FrodoKEM on 64-bit ARMv8 Processors -- Quantitative Analysis on Attack Capacity in Meltdown-type Attacks -- Application Security -- Adaptive Network Security Service Orchestraction based on SDN/NFV -- A General Framework for Matching Pattern Hiding in Deep Packet Inspection -- A Privacy-Preserving Payment Model for EV Charging -- Measuring Healthcare Data Breaches -- BadASLR: Exceptional cases of ASLR aiding Exploitation. 001440664 506__ $$aAccess limited to authorized users. 001440664 520__ $$aThis book constitutes the revised selected papers from the 22nd International Conference on Information Security Applications, WISA 2021, which took place on Jeju Island, South Korea, during August 2021. The 23 papers included in this book were carefully reviewed and selected from 66 submissions. They were organized in topical sections as follows: machine learning security; cryptography; hardware security; and application security. 001440664 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed November 4, 2021). 001440664 650_0 $$aComputer security$$vCongresses. 001440664 650_0 $$aData protection$$vCongresses. 001440664 650_6 $$aSécurité informatique$$vCongrès. 001440664 650_6 $$aProtection de l'information (Informatique)$$vCongrès. 001440664 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001440664 655_7 $$aConference papers and proceedings.$$2lcgft 001440664 655_7 $$aActes de congrès.$$2rvmgf 001440664 655_0 $$aElectronic books. 001440664 7001_ $$aKim, Hyoungshick.,$$eeditor. 001440664 77608 $$iPrint version:$$aWISA (Workshop : Information security) (22nd : 2021 : Cheju Island, Korea).$$tInformation security applications.$$dCham : Springer, [2021]$$z3030894312$$z9783030894313$$w(OCoLC)1268325720 001440664 830_0 $$aLecture notes in computer science ;$$v13009. 001440664 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 001440664 852__ $$bebk 001440664 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-89432-0$$zOnline Access$$91397441.1 001440664 909CO $$ooai:library.usi.edu:1440664$$pGLOBAL_SET 001440664 980__ $$aBIB 001440664 980__ $$aEBOOK 001440664 982__ $$aEbook 001440664 983__ $$aOnline 001440664 994__ $$a92$$bISE