Information Security Practice and Experience: 15th International Conference, Ispec 2019, Kuala Lumpur, Malaysia, November 26-28, 2019, Proceedings » książka
Cryptography I.- Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model.-A Bitwise Logistic Regression using Binary Approximation and Real Number Division in Homomorphic Encryption Scheme.- Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme.- Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE.- System and Network Security.- KMO : Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanism.- Peel the onion: Recognition of Android apps behind the Tor Network.- JSLess: A Tale of a Fileless Javascript Memory-Resident Malware.- Security Protocol and Tool.- A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation.- Secure Best Arm Identification in Multi-Armed Bandits.- CATCHA: When Cats Track Your Movements Online.- Designing a Code Vulnerability Meta-Scanner.- Access Control and Authentication.- Using IFTTT to Express and Enforce UCON Obligations.- Evaluation of Software PUF Based on Gyroscope.- White-Box Implementation of the KMAC Message Authentication Code.- Cryptography II.- Improving Signature Schemes With Tight Security Reductions.- Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings.- Identity-based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios.- Recovering Internal States of Grain-v1.- Data and User Privacy.- GDPR-Compliant Reputation System Based on Self-Certifying Domain Signatures.- Defining a new composite cybersecurity rating scheme for SMEs in the U.K..- Privacy Preserving Approach in Dynamic Social Network Data Publishing.- Short Paper I.- Using Freivalds’ algorithm to accelerate Lattice-Based Signature Verifications.- Group-based Key Exchange Protocol based on Complete Decomposition Search Problem.- Development Activities, Tools and Techniques of Secure Microservices Compositions.- Generating Phishing Emails Using Graph Database.- Short Paper II.- Evaluating Intrusion Sensitivity Allocation with Support Vector Machine for Collaborative Intrusion Detection.- The (Persistent) Threat of Weak Passwords: Implementation of a Semi-Automatic Password-Cracking Algorithm.- A Novel and Comprehensive Evaluation Methodology for SIEM.