MARC details
| 000 -LEADER |
| fixed length control field |
07347cam a2200913 a 4500 |
| 001 - CONTROL NUMBER |
| control field |
on1290485307 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
OCoLC |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20250707094239.0 |
| 006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
| fixed length control field |
m o d |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
| fixed length control field |
cr un|---aucuu |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
220101s2021 sz o 101 0 eng d |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
EBLCP |
| Language of cataloging |
eng |
| Description conventions |
pn |
| Transcribing agency |
EBLCP |
| Modifying agency |
GW5XE |
| -- |
DKU |
| -- |
YDX |
| -- |
OCLCO |
| -- |
OCLCF |
| -- |
OCLCO |
| -- |
COM |
| -- |
OCLCO |
| -- |
OCLCQ |
| -- |
OCLCO |
| -- |
OCLCL |
| 019 ## - |
| -- |
1289442484 |
| -- |
1289482186 |
| -- |
1289535594 |
| -- |
1289606927 |
| -- |
1290022614 |
| -- |
1292518358 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9783030932060 |
| Qualifying information |
(electronic bk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
3030932060 |
| Qualifying information |
(electronic bk.) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| Canceled/invalid ISBN |
9783030932053 |
| Qualifying information |
(print) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| Canceled/invalid ISBN |
3030932052 |
| 024 7# - OTHER STANDARD IDENTIFIER |
| Standard number or code |
10.1007/978-3-030-93206-0 |
| Source of number or code |
doi |
| 029 1# - (OCLC) |
| OCLC library identifier |
AU@ |
| System control number |
000070394810 |
| 029 1# - (OCLC) |
| OCLC library identifier |
AU@ |
| System control number |
000070459680 |
| 029 1# - (OCLC) |
| OCLC library identifier |
AU@ |
| System control number |
000070481221 |
| 029 1# - (OCLC) |
| OCLC library identifier |
AU@ |
| System control number |
000076517063 |
| 029 1# - (OCLC) |
| OCLC library identifier |
AU@ |
| System control number |
000076542671 |
| 029 1# - (OCLC) |
| OCLC library identifier |
AU@ |
| System control number |
000077486619 |
| 035 ## - SYSTEM CONTROL NUMBER |
| System control number |
(OCoLC)1290485307 |
| Canceled/invalid control number |
(OCoLC)1289442484 |
| -- |
(OCoLC)1289482186 |
| -- |
(OCoLC)1289535594 |
| -- |
(OCoLC)1289606927 |
| -- |
(OCoLC)1290022614 |
| -- |
(OCoLC)1292518358 |
| 050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
QA76.9.A25 |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
COM053000 |
| Source |
bisacsh |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
UR |
| Source |
bicssc |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
UR |
| Source |
thema |
| 072 #7 - SUBJECT CATEGORY CODE |
| Subject category code |
UTN |
| Source |
thema |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
23 |
| 049 ## - LOCAL HOLDINGS (OCLC) |
| Holding library |
MAIN |
| 111 2# - MAIN ENTRY--MEETING NAME |
| Meeting name or jurisdiction name as entry element |
ISPEC (Conference) |
| Number of part/section/meeting |
(16th : |
| Date of meeting |
2021 : |
| Location of meeting |
Nanjing, China) |
| 9 (RLIN) |
968952 |
| 245 10 - TITLE STATEMENT |
| Title |
Information Security Practice and Experience : |
| Remainder of title |
16th International Conference, ISPEC 2021, Nanjing, China, December 17-19, 2021, Proceedings / |
| Statement of responsibility, etc. |
Robert Deng, Feng Bao, Guilin Wang, Jian Shen, Mark Ryan, Weizhi Meng, Ding Wang (eds.). |
| 246 3# - VARYING FORM OF TITLE |
| Title proper/short title |
ISPEC 2021 |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc. |
Cham, Switzerland : |
| Name of publisher, distributor, etc. |
Springer, |
| Date of publication, distribution, etc. |
2021. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
1 online resource (406 pages) |
| 336 ## - CONTENT TYPE |
| Content type term |
text |
| Content type code |
txt |
| Source |
rdacontent |
| 337 ## - MEDIA TYPE |
| Media type term |
computer |
| Media type code |
c |
| Source |
rdamedia |
| 338 ## - CARRIER TYPE |
| Carrier type term |
online resource |
| Carrier type code |
cr |
| Source |
rdacarrier |
| 347 ## - DIGITAL FILE CHARACTERISTICS |
| File type |
text file |
| 347 ## - DIGITAL FILE CHARACTERISTICS |
| Encoding format |
PDF |
| 490 1# - SERIES STATEMENT |
| Series statement |
Lecture notes in computer science ; |
| Volume/sequential designation |
13107 |
| 490 1# - SERIES STATEMENT |
| Series statement |
LNCS sublibrary, SL 4, Security and cryptology |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Intro -- Preface -- Organization -- Contents -- Efficient Construction of Public-Key Matrices in Lattice-Based Cryptography: Chaos Strikes Again -- 1 Introduction -- 2 Preliminaries -- 2.1 The Chaotic System: Logistic Map -- 2.2 LWE and the Encryption Scheme -- 3 The Proposed Public-Key Construction -- 3.1 Generating Uniform Chaotic Sequences -- 3.2 Public Key Matrices Constructed from Chaotic Sequences -- 3.3 The Public-Key Encryption Scheme Based on LWE and Chaos -- 4 Tests -- 4.1 Chi-Square Tests and K-S Tests -- 4.2 Gap Tests -- 4.3 Construction of Keys -- 5 Conclusion -- References |
| 505 8# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Explore Capabilities and Effectiveness of Reverse Engineering Tools to Provide Memory Safety for Binary Programs -- 1 Introduction -- 2 Related Works -- 3 Benchmarks and Frameworks -- 3.1 Experimental Framework -- 3.2 Benchmarks -- 4 Static Reverse Engineering -- 4.1 Setup and Implementation Details -- 4.2 Efficacy of Reverse Engineering Tools -- 5 Run-Time Framework to Detect Memory Errors -- 5.1 Dynamic Tracking and Instrumentation Using Pin -- 5.2 Buffer Overflow Detection Accuracy -- 5.3 Performance Overhead -- 6 Conclusions and Future Work -- A Optimized Benchmarks |
| 505 8# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
B Detection Accuracy Using Ghidra -- C Program Execution Time Overhead by the Pin-Based Run-Time Technique -- References -- Enhanced Mixup Training: a Defense Method Against Membership Inference Attack -- 1 Introduction -- 1.1 A Subsection Sample -- 2 Preliminary -- 2.1 Membership Inference Attack -- 2.2 Recent Defense Against Membership Inference Attack -- 2.3 Definition of Mixup -- 3 Enhanced Mixup Training Against Membership Inference Attack -- 3.1 Enhanced Mixup Training -- 3.2 Regularization Proof of EMI -- 4 Experiment Results -- 4.1 Dataset -- 4.2 Experimental Setup |
| 505 8# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
4.3 Experimental Results -- 5 Conclusion and Future Work -- References -- Isogeny Computation on Twisted Jacobi Intersections -- 1 Introduction -- 2 Preliminaries -- 3 Isogenies on Twisted Jacobi Intersections -- 3.1 2-Isogeny -- 3.2 Odd Degree Isogenies -- 4 -Coordinate on Twisted Jacobi Intersections -- 4.1 -Coordinate System for Differential Addition -- 4.2 -Coordinate for Isogenies -- 4.3 Computational Cost -- 5 Conclusion -- References -- EPFSTO-ARIMA: Electric Power Forced Stochastic Optimization Predicting Based on ARIMA -- 1 Introduction -- 2 Related Work |
| 505 8# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
2.1 Data Poisoning and Adversarial Examples -- 2.2 ARIMA -- 2.3 Dropout -- 2.4 Data Poisoning Attack Defense -- 3 Our Approach -- 3.1 Similarity Calculation -- 3.2 Data Stochastic Sampling and Data Optimization -- 3.3 EPFSTO-ARIMA -- 4 Experiments and Results -- 4.1 Experimental Data and Parameter Description -- 4.2 Adopted Metrics -- 4.3 Experiments Results -- 5 Conclusions and Future Work -- References -- Out of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic Matrix -- 1 Introduction -- 2 Preliminaries -- 2.1 Notation -- 2.2 The Boolean Function |
| 500 ## - GENERAL NOTE |
| General note |
3 Searching the Impossible Differentials by Bitwise Characteristic Matrix. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc. |
This book constitutes the refereed proceedings of the 16th International Conference on Information Security Practice and Experience, ISPEC 2021, held in Nanjing, China, in December 2021. The 23 full papers presented in this volume were carefully reviewed and selected from 94 submissions. The conference focus on new information security technologies, including their applications and their integration with IT systems in various vertical sectors. |
| 500 ## - GENERAL NOTE |
| General note |
Includes author index. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security |
| Form subdivision |
Congresses. |
| 9 (RLIN) |
14968 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer networks |
| General subdivision |
Security measures |
| Form subdivision |
Congresses. |
| 9 (RLIN) |
15567 |
| 650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Sécurité informatique |
| Form subdivision |
Congrès. |
| 9 (RLIN) |
17411 |
| 650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Réseaux d'ordinateurs |
| General subdivision |
Sécurité |
| -- |
Mesures |
| Form subdivision |
Congrès. |
| 9 (RLIN) |
16513 |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer networks |
| General subdivision |
Security measures |
| Source of heading or term |
fast |
| 650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security |
| Source of heading or term |
fast |
| 9 (RLIN) |
2191 |
| 655 #2 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Congress |
| 9 (RLIN) |
11670 |
| 655 #7 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
proceedings (reports) |
| Source of term |
aat |
| 655 #7 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Conference papers and proceedings |
| Source of term |
fast |
| 9 (RLIN) |
6065 |
| 655 #7 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Conference papers and proceedings. |
| Source of term |
lcgft |
| 9 (RLIN) |
6065 |
| 655 #7 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Actes de congrès. |
| Source of term |
rvmgf |
| 9 (RLIN) |
609890 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Deng, Robert H. |
| 9 (RLIN) |
21454 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Bao, Feng, |
| Titles and other words associated with a name |
Dr. |
| -- |
https://id.oclc.org/worldcat/entity/E39PCjMpqcfj33CXh6rqtdMycX |
| 9 (RLIN) |
24095 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Wang, Guilin, |
| Titles and other words associated with a name |
Dr. |
| -- |
https://id.oclc.org/worldcat/entity/E39PCjvDrtjDvX4p36jX6tqb3P |
| 9 (RLIN) |
25629 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Shen, Jian. |
| 9 (RLIN) |
968953 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Ryan, Mark, |
| Dates associated with a name |
1962- |
| -- |
https://id.oclc.org/worldcat/entity/E39PCjHMQjCvyPWYWcXpCWBycX |
| 9 (RLIN) |
6179 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Meng, Weizhi, |
| Dates associated with a name |
1986- |
| -- |
https://id.oclc.org/worldcat/entity/E39PCjGj9wHRm8ykwF36DFfFVd |
| 9 (RLIN) |
68028 |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Wang, Ding. |
| 9 (RLIN) |
968954 |
| 758 ## - |
| -- |
has work: |
| -- |
Information Security Practice and Experience (Text) |
| -- |
https://id.oclc.org/worldcat/entity/E39PCFPktRxWgWffPjvbvPYhgX |
| -- |
https://id.oclc.org/worldcat/ontology/hasWork |
| 776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
| Relationship information |
Print version: |
| Main entry heading |
Deng, Robert. |
| Title |
Information Security Practice and Experience. |
| Place, publisher, and date of publication |
Cham : Springer International Publishing AG, ©2022 |
| International Standard Book Number |
9783030932053 |
| 830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
| Uniform title |
Lecture notes in computer science ; |
| Volume number/sequential designation |
13107. |
| 830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE |
| Uniform title |
LNCS sublibrary. |
| Number of part/section of a work |
SL 4, |
| Name of part/section of a work |
Security and cryptology. |
| 9 (RLIN) |
20708 |
| 856 40 - ELECTRONIC LOCATION AND ACCESS |
| Uniform Resource Identifier |
<a href="https://link.springer.com/10.1007/978-3-030-93206-0">https://link.springer.com/10.1007/978-3-030-93206-0</a> |
| 938 ## - |
| -- |
ProQuest Ebook Central |
| -- |
EBLB |
| -- |
EBL6828333 |
| 938 ## - |
| -- |
YBP Library Services |
| -- |
YANK |
| -- |
302645521 |
| 994 ## - |
| -- |
92 |
| -- |
ATIST |