Information Security Practice and Experience : (Record no. 649100)

MARC details
000 -LEADER
fixed length control field 07347cam a2200913 a 4500
001 - CONTROL NUMBER
control field on1290485307
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250707094239.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr un|---aucuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220101s2021 sz o 101 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency EBLCP
Language of cataloging eng
Description conventions pn
Transcribing agency EBLCP
Modifying agency GW5XE
-- DKU
-- YDX
-- OCLCO
-- OCLCF
-- OCLCO
-- COM
-- OCLCO
-- OCLCQ
-- OCLCO
-- OCLCL
019 ## -
-- 1289442484
-- 1289482186
-- 1289535594
-- 1289606927
-- 1290022614
-- 1292518358
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783030932060
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 3030932060
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9783030932053
Qualifying information (print)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 3030932052
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-030-93206-0
Source of number or code doi
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000070394810
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000070459680
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000070481221
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000076517063
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000076542671
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000077486619
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1290485307
Canceled/invalid control number (OCoLC)1289442484
-- (OCoLC)1289482186
-- (OCoLC)1289535594
-- (OCoLC)1289606927
-- (OCoLC)1290022614
-- (OCoLC)1292518358
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code UR
Source thema
072 #7 - SUBJECT CATEGORY CODE
Subject category code UTN
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
111 2# - MAIN ENTRY--MEETING NAME
Meeting name or jurisdiction name as entry element ISPEC (Conference)
Number of part/section/meeting (16th :
Date of meeting 2021 :
Location of meeting Nanjing, China)
9 (RLIN) 968952
245 10 - TITLE STATEMENT
Title Information Security Practice and Experience :
Remainder of title 16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings /
Statement of responsibility, etc. Robert Deng, Feng Bao, Guilin Wang, Jian Shen, Mark Ryan, Weizhi Meng, Ding Wang (eds.).
246 3# - VARYING FORM OF TITLE
Title proper/short title ISPEC 2021
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Cham, Switzerland :
Name of publisher, distributor, etc. Springer,
Date of publication, distribution, etc. 2021.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (406 pages)
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
347 ## - DIGITAL FILE CHARACTERISTICS
Encoding format PDF
490 1# - SERIES STATEMENT
Series statement Lecture notes in computer science ;
Volume/sequential designation 13107
490 1# - SERIES STATEMENT
Series statement LNCS sublibrary, SL 4, Security and cryptology
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Intro -- Preface -- Organization -- Contents -- Efficient Construction of Public-Key Matrices in Lattice-Based Cryptography: Chaos Strikes Again -- 1 Introduction -- 2 Preliminaries -- 2.1 The Chaotic System: Logistic Map -- 2.2 LWE and the Encryption Scheme -- 3 The Proposed Public-Key Construction -- 3.1 Generating Uniform Chaotic Sequences -- 3.2 Public Key Matrices Constructed from Chaotic Sequences -- 3.3 The Public-Key Encryption Scheme Based on LWE and Chaos -- 4 Tests -- 4.1 Chi-Square Tests and K-S Tests -- 4.2 Gap Tests -- 4.3 Construction of Keys -- 5 Conclusion -- References
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Explore Capabilities and Effectiveness of Reverse Engineering Tools to Provide Memory Safety for Binary Programs -- 1 Introduction -- 2 Related Works -- 3 Benchmarks and Frameworks -- 3.1 Experimental Framework -- 3.2 Benchmarks -- 4 Static Reverse Engineering -- 4.1 Setup and Implementation Details -- 4.2 Efficacy of Reverse Engineering Tools -- 5 Run-Time Framework to Detect Memory Errors -- 5.1 Dynamic Tracking and Instrumentation Using Pin -- 5.2 Buffer Overflow Detection Accuracy -- 5.3 Performance Overhead -- 6 Conclusions and Future Work -- A Optimized Benchmarks
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note B Detection Accuracy Using Ghidra -- C Program Execution Time Overhead by the Pin-Based Run-Time Technique -- References -- Enhanced Mixup Training: a Defense Method Against Membership Inference Attack -- 1 Introduction -- 1.1 A Subsection Sample -- 2 Preliminary -- 2.1 Membership Inference Attack -- 2.2 Recent Defense Against Membership Inference Attack -- 2.3 Definition of Mixup -- 3 Enhanced Mixup Training Against Membership Inference Attack -- 3.1 Enhanced Mixup Training -- 3.2 Regularization Proof of EMI -- 4 Experiment Results -- 4.1 Dataset -- 4.2 Experimental Setup
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4.3 Experimental Results -- 5 Conclusion and Future Work -- References -- Isogeny Computation on Twisted Jacobi Intersections -- 1 Introduction -- 2 Preliminaries -- 3 Isogenies on Twisted Jacobi Intersections -- 3.1 2-Isogeny -- 3.2 Odd Degree Isogenies -- 4 -Coordinate on Twisted Jacobi Intersections -- 4.1 -Coordinate System for Differential Addition -- 4.2 -Coordinate for Isogenies -- 4.3 Computational Cost -- 5 Conclusion -- References -- EPFSTO-ARIMA: Electric Power Forced Stochastic Optimization Predicting Based on ARIMA -- 1 Introduction -- 2 Related Work
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.1 Data Poisoning and Adversarial Examples -- 2.2 ARIMA -- 2.3 Dropout -- 2.4 Data Poisoning Attack Defense -- 3 Our Approach -- 3.1 Similarity Calculation -- 3.2 Data Stochastic Sampling and Data Optimization -- 3.3 EPFSTO-ARIMA -- 4 Experiments and Results -- 4.1 Experimental Data and Parameter Description -- 4.2 Adopted Metrics -- 4.3 Experiments Results -- 5 Conclusions and Future Work -- References -- Out of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic Matrix -- 1 Introduction -- 2 Preliminaries -- 2.1 Notation -- 2.2 The Boolean Function
500 ## - GENERAL NOTE
General note 3 Searching the Impossible Differentials by Bitwise Characteristic Matrix.
520 ## - SUMMARY, ETC.
Summary, etc. This book constitutes the refereed proceedings of the 16th International Conference on Information Security Practice and Experience, ISPEC 2021, held in Nanjing, China, in December 2021. The 23 full papers presented in this volume were carefully reviewed and selected from 94 submissions. The conference focus on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
500 ## - GENERAL NOTE
General note Includes author index.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Form subdivision Congresses.
9 (RLIN) 14968
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
Form subdivision Congresses.
9 (RLIN) 15567
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Sécurité informatique
Form subdivision Congrès.
9 (RLIN) 17411
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Réseaux d'ordinateurs
General subdivision Sécurité
-- Mesures
Form subdivision Congrès.
9 (RLIN) 16513
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Source of heading or term fast
9 (RLIN) 2191
655 #2 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Congress
9 (RLIN) 11670
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term proceedings (reports)
Source of term aat
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Conference papers and proceedings
Source of term fast
9 (RLIN) 6065
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Conference papers and proceedings.
Source of term lcgft
9 (RLIN) 6065
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Actes de congrès.
Source of term rvmgf
9 (RLIN) 609890
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Deng, Robert H.
9 (RLIN) 21454
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Bao, Feng,
Titles and other words associated with a name Dr.
-- https://id.oclc.org/worldcat/entity/E39PCjMpqcfj33CXh6rqtdMycX
9 (RLIN) 24095
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Wang, Guilin,
Titles and other words associated with a name Dr.
-- https://id.oclc.org/worldcat/entity/E39PCjvDrtjDvX4p36jX6tqb3P
9 (RLIN) 25629
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Shen, Jian.
9 (RLIN) 968953
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Ryan, Mark,
Dates associated with a name 1962-
-- https://id.oclc.org/worldcat/entity/E39PCjHMQjCvyPWYWcXpCWBycX
9 (RLIN) 6179
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Meng, Weizhi,
Dates associated with a name 1986-
-- https://id.oclc.org/worldcat/entity/E39PCjGj9wHRm8ykwF36DFfFVd
9 (RLIN) 68028
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Wang, Ding.
9 (RLIN) 968954
758 ## -
-- has work:
-- Information Security Practice and Experience (Text)
-- https://id.oclc.org/worldcat/entity/E39PCFPktRxWgWffPjvbvPYhgX
-- https://id.oclc.org/worldcat/ontology/hasWork
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Deng, Robert.
Title Information Security Practice and Experience.
Place, publisher, and date of publication Cham : Springer International Publishing AG, ©2022
International Standard Book Number 9783030932053
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture notes in computer science ;
Volume number/sequential designation 13107.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title LNCS sublibrary.
Number of part/section of a work SL 4,
Name of part/section of a work Security and cryptology.
9 (RLIN) 20708
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://link.springer.com/10.1007/978-3-030-93206-0">https://link.springer.com/10.1007/978-3-030-93206-0</a>
938 ## -
-- ProQuest Ebook Central
-- EBLB
-- EBL6828333
938 ## -
-- YBP Library Services
-- YANK
-- 302645521
994 ## -
-- 92
-- ATIST
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection code Home library Current library Date acquired Total Checkouts Date last seen Price effective from Koha item type
  Not Lost     eBook LNCS e-Library e-Library 02/08/2022   02/08/2022 02/08/2022 eBook

Powered by Koha