Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.
Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente
This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15–17, 2024.
The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Blockchain Technology, Privacy Enhancing Technologies, System Security, Network Security, AI Security.
Blockchain Technology.- Enhancing Permissioned Blockchains with Controlled Data Authorization.- FXChain a multi consortium blockchain with flexible privacy preserving strategies.- An Efficient Vulnerability Detection for Smart Contracts Using Gated Graph Neural Network.- Lightweight Instance Batch Schemes towards Prover efficient Decentralized Private Computation.- CrossAAD Cross-chain Abnormal Account Detection.- AegisDB Scalable Blockchain Database with Secure Decentralised Load Balancing.- Towards Scalable and Secure IoTs Transactions A New Bi directional Payment Channel without Third Party Monitoring.- Privacy Enhancing Technologies.- Understanding Privacy in Smart Speakers A Narrative Review.- RPPDFL A Robustness and Privacy Preserving Decentralized Federated Learning System.- FedSCD Federated learning with Semi centralization Discrepancy awareness and Dual model Collaboration.- Pirates Anonymous Group Calls Over Fully Untrusted Infrastructure.- SecuPath A Secure and Privacy Preserving Multiparty Path Planning Framework in UAV Applications.- System Security.- TSHMD Explainable Deep Learning for Time Series HPCs based IoT Malware Detection.- Security Research for Android Remote Assistance Apps.- SynBoost Robust Text Generation Model Via Beam Search and Synonym Driven Boosting.- CCED A Configuration Failure Prevention Method for Autonomous Driving Systems.- Action Driven UAV Fingerprint Verification with Perception Data.- AggNoteBot A Robust Botnet Building using Aggressive Cloud Notes.- Network Security.- FSAM Framework for Online CDN based Website Classification.- Towards Private Multi-Operator Network Slicing.- AI Security.- An Encrypted Traffic Classification Framework Based on Higher Interaction Graph Neural Network.- PassTSL Modeling Human Created Passwords through Two Stage Learning.- Detect Llama Finding Vulnerabilities in Smart Contracts using Large Language Models.- MMOOC A Multimodal Misinformation Dataset for Out of Context News Analysis.
Il sito utilizza cookie ed altri strumenti di tracciamento che raccolgono informazioni dal dispositivo dell’utente. Oltre ai cookie tecnici ed analitici aggregati, strettamente necessari per il funzionamento di questo sito web, previo consenso dell’utente possono essere installati cookie di profilazione e marketing e cookie dei social media. Cliccando su “Accetto tutti i cookie” saranno attivate tutte le categorie di cookie. Per accettare solo deterninate categorie di cookie, cliccare invece su “Impostazioni cookie”. Chiudendo il banner o continuando a navigare saranno installati solo cookie tecnici. Per maggiori dettagli, consultare la Cookie Policy.