{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T04:08:10Z","timestamp":1749874090752,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":52,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819655656","type":"print"},{"value":"9789819655663","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-5566-3_14","type":"book-chapter","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:23:15Z","timestamp":1749846195000},"page":"261-284","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["REAF: Replacing Exponential Activation Function to\u00a0Prevent Side-Channel Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-9309-2739","authenticated-orcid":false,"given":"Joonsup","family":"Kim","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4820-389X","authenticated-orcid":false,"given":"Dongjun","family":"Park","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9937-674X","authenticated-orcid":false,"given":"GyuSang","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6594-732X","authenticated-orcid":false,"given":"Sujin","family":"Park","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5523-6710","authenticated-orcid":false,"given":"Daehyeon","family":"Bae","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8137-4810","authenticated-orcid":false,"given":"Heeseok","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7506-4023","authenticated-orcid":false,"given":"Seokie","family":"Hong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,14]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Athanasiou, K., Wahl, T., Ding, A.A., Fei, Y.: Masking feedforward neural networks against power analysis attacks. In: Proceedings on Privacy Enhancing Technologies (2022)","DOI":"10.2478\/popets-2022-0025"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Bae, H.S., Lee, H.J., Lee, S.G.: Voice recognition based on adaptive MFCC and deep learning. In: 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA), pp. 1542\u20131546. IEEE (2016)","DOI":"10.1109\/ICIEA.2016.7603830"},{"key":"14_CR3","unstructured":"Batina, L., Bhasin, S., Jap, D., Picek, S.: $$\\{$$CSI$$\\}$$$$\\{$$NN$$\\}$$: reverse engineering of neural network architectures through electromagnetic side channel. In: 28th USENIX Security Symposium (USENIX Security 2019), pp. 515\u2013532 (2019)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Breier, J., Jap, D., Hou, X., Bhasin, S.: A desynchronization-based countermeasure against side-channel analysis of neural networks. In: International Symposium on Cyber Security, Cryptology, and Machine Learning, pp. 296\u2013306. Springer, Cham (2023)","DOI":"10.1007\/978-3-031-34671-2_21"},{"key":"14_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-540-28632-5_2","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"E Brier","year":"2004","unstructured":"Brier, E., Clavier, C., Olivier, F.: Correlation power analysis with a leakage model. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 16\u201329. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28632-5_2"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Brosch, M., Probst, M., Glaser, M., Sigl, G.: A masked hardware accelerator for feed-forward neural networks with fixed-point arithmetic. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. (2023)","DOI":"10.1109\/TVLSI.2023.3340553"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Buhan, I., Batina, L., Yarom, Y., Schaumont, P.: SoK: design tools for side-channel-aware implementations. In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security, pp. 756\u2013770 (2022)","DOI":"10.1145\/3488932.3517415"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/3-540-48405-1_26","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"S Chari","year":"1999","unstructured":"Chari, S., Jutla, C.S., Rao, J.R., Rohatgi, P.: Towards sound approaches to counteract power-analysis attacks. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398\u2013412. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_26"},{"issue":"2","key":"14_CR9","doi-asserted-by":"publisher","first-page":"276","DOI":"10.46586\/tches.v2024.i2.276-303","volume":"2024","author":"KY Chen","year":"2024","unstructured":"Chen, K.Y., Chen, J.P.: Masking floating-point number multiplication and addition of falcon: first-and higher-order implementations and evaluations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2), 276\u2013303 (2024)","journal-title":"IACR Trans. Cryptogr. Hardw. Embed. Syst."},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Chen, X., Hu, X., Zhou, H., Xu, N.: Fxpnet: training a deep convolutional neural network in fixed-point representation. In: 2017 International Joint Conference on Neural Networks (IJCNN), pp. 2494\u20132501. IEEE (2017)","DOI":"10.1109\/IJCNN.2017.7966159"},{"key":"14_CR11","unstructured":"Clevert, D.A., Unterthiner, T., Hochreiter, S.: Fast and accurate deep network learning by exponential linear units (ELUS). arXiv preprint arXiv:1511.07289 (2015)"},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-319-66787-4_5","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2017","author":"J-S Coron","year":"2017","unstructured":"Coron, J.-S.: High-order conversion from boolean to arithmetic masking. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 93\u2013114. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66787-4_5"},{"key":"14_CR13","unstructured":"Diaa, A., et al.: Fast and private inference of deep neural networks by co-designing activation functions. arXiv preprint arXiv:2306.08538 (2023)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Ding, G.L., Chu, J., Yuan, L., Zhao, Q.: Correlation electromagnetic analysis for cryptographic device. In: 2009 Pacific-Asia Conference on Circuits, Communications and Systems, pp. 388\u2013391. IEEE (2009)","DOI":"10.1109\/PACCS.2009.144"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Dubey, A., Ahmad, A., Pasha, M.A., Cammarota, R., Aysu, A.: Modulonet: neural networks meet modular arithmetic for efficient hardware masking. IACR Trans. Cryptogr. Hardw. Embed. Syst. 506\u2013556 (2022)","DOI":"10.46586\/tches.v2022.i1.506-556"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Dubey, A., Cammarota, R., Aysu, A.: Bomanet: boolean masking of an entire neural network. In: Proceedings of the 39th International Conference on Computer-Aided Design, pp.\u00a01\u20139 (2020)","DOI":"10.1145\/3400302.3415649"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Dubey, A., Cammarota, R., Aysu, A.: Maskednet: the first hardware inference engine aiming power side-channel protection. In: 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 197\u2013208. IEEE (2020)","DOI":"10.1109\/HOST45689.2020.9300276"},{"key":"14_CR18","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.neucom.2022.06.111","volume":"503","author":"SR Dubey","year":"2022","unstructured":"Dubey, S.R., Singh, S.K., Chaudhuri, B.B.: Activation functions in deep learning: a comprehensive survey and benchmark. Neurocomputing 503, 92\u2013108 (2022)","journal-title":"Neurocomputing"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1322\u20131333 (2015)","DOI":"10.1145\/2810103.2813677"},{"key":"14_CR20","unstructured":"Garimella, K., Jha, N.K., Reagen, B.: Sisyphus: a cautionary tale of using low-degree polynomial activations in privacy-preserving deep learning. arXiv preprint arXiv:2107.12342 (2021)"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Gaspoz, J., Dhooghe, S.: Threshold implementations in software: micro-architectural leakages in algorithms. IACR Trans. Cryptogr. Hardw. Embed. Syst. 155\u2013179 (2023)","DOI":"10.46586\/tches.v2023.i2.155-179"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Gopinath, S., Ghanathe, N., Seshadri, V., Sharma, R.: Compiling KB-sized machine learning models to tiny IoT devices. In: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, pp. 79\u201395 (2019)","DOI":"10.1145\/3314221.3314597"},{"key":"14_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-642-23951-9_6","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2011","author":"L Goubin","year":"2011","unstructured":"Goubin, L., Martinelli, A.: Protecting AES with Shamir\u2019s secret sharing scheme. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 79\u201394. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23951-9_6"},{"issue":"3","key":"14_CR24","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1002\/rob.21918","volume":"37","author":"S Grigorescu","year":"2020","unstructured":"Grigorescu, S., Trasnea, B., Cocias, T., Macesanu, G.: A survey of deep learning techniques for autonomous driving. J. Field Robot. 37(3), 362\u2013386 (2020)","journal-title":"J. Field Robot."},{"key":"14_CR25","unstructured":"Horvath, P., Chmielewski, L., Weissbart, L., Batina, L., Yarom, Y.: Barracuda: bringing electromagnetic side channel into play to steal the weights of neural networks from nvidia GPUs. arXiv preprint arXiv:2312.07783 (2023)"},{"key":"14_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/978-3-540-45146-4_27","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"Y Ishai","year":"2003","unstructured":"Ishai, Y., Sahai, A., Wagner, D.: Private circuits: securing hardware against probing attacks. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 463\u2013481. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_27"},{"key":"14_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/3-540-48405-1_25","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 99","author":"P Kocher","year":"1999","unstructured":"Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388\u2013397. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25"},{"key":"14_CR28","doi-asserted-by":"crossref","unstructured":"Leboeuf, K., Namin, A.H., Muscedere, R., Wu, H., Ahmadi, M.: High speed VLSI implementation of the hyperbolic tangent sigmoid function. In: 2008 Third International Conference on Convergence and Hybrid Information Technology, vol.\u00a01, pp. 1070\u20131073. IEEE (2008)","DOI":"10.1109\/ICCIT.2008.131"},{"issue":"11","key":"14_CR29","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"14_CR30","unstructured":"Leino, K., Fredrikson, M.: Stolen memories: leveraging model memorization for calibrated $$\\{$$White-Box$$\\}$$ membership inference. In: 29th USENIX security symposium (USENIX Security 2020), pp. 1605\u20131622 (2020)"},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Li, B., Qin, Y., Yuan, B., Lilja, D.J.: Neural network classifiers using stochastic computing with a hardware-oriented approximate activation function. In: 2017 IEEE International Conference on Computer Design (ICCD), pp. 97\u2013104. IEEE (2017)","DOI":"10.1109\/ICCD.2017.23"},{"issue":"1","key":"14_CR32","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MNET.2018.1700202","volume":"32","author":"H Li","year":"2018","unstructured":"Li, H., Ota, K., Dong, M.: Learning IoT in edge: deep learning for the internet of things with edge computing. IEEE Network 32(1), 96\u2013101 (2018)","journal-title":"IEEE Network"},{"key":"14_CR33","doi-asserted-by":"crossref","unstructured":"Luo, X., Wu, Y., Xiao, X., Ooi, B.C.: Feature inference attack on model predictions in vertical federated learning. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE), pp. 181\u2013192. IEEE (2021)","DOI":"10.1109\/ICDE51399.2021.00023"},{"issue":"1","key":"14_CR34","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1109\/JSSC.2022.3215670","volume":"58","author":"S Maji","year":"2022","unstructured":"Maji, S., Banerjee, U., Fuller, S.H., Chandrakasan, A.P.: A threshold implementation-based neural network accelerator with power and electromagnetic side-channel countermeasures. IEEE J. Solid-State Circuits 58(1), 141\u2013154 (2022)","journal-title":"IEEE J. Solid-State Circuits"},{"key":"14_CR35","unstructured":"McCann, D., Oswald, E., Whitnall, C.: Towards practical tools for side channel aware software engineering: \u2018grey box\u2019 modelling for instruction leakages. In: 26th USENIX Security Symposium (Usenix Security 2017), pp. 199\u2013216 (2017)"},{"key":"14_CR36","doi-asserted-by":"crossref","unstructured":"Meher, P.K.: An optimized lookup-table for the evaluation of sigmoid function for artificial neural networks. In: 2010 18th IEEE\/IFIP International Conference on VLSI and System-on-Chip, pp. 91\u201395. IEEE (2010)","DOI":"10.1109\/VLSISOC.2010.5642617"},{"issue":"15","key":"14_CR37","doi-asserted-by":"publisher","first-page":"6790","DOI":"10.3390\/app11156790","volume":"11","author":"M M\u00e9ndez Real","year":"2021","unstructured":"M\u00e9ndez Real, M., Salvador, R.: Physical side-channel attacks on embedded neural networks: a survey. Appl. Sci. 11(15), 6790 (2021)","journal-title":"Appl. Sci."},{"issue":"4","key":"14_CR38","doi-asserted-by":"publisher","first-page":"2923","DOI":"10.1109\/COMST.2018.2844341","volume":"20","author":"M Mohammadi","year":"2018","unstructured":"Mohammadi, M., Al-Fuqaha, A., Sorour, S., Guizani, M.: Deep learning for IoT big data and streaming analytics: a survey. IEEE Commun. Surv. Tutor. 20(4), 2923\u20132960 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"14_CR39","doi-asserted-by":"crossref","unstructured":"Mohassel, P., Zhang, Y.: Secureml: a system for scalable privacy-preserving machine learning. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 19\u201338. IEEE (2017)","DOI":"10.1109\/SP.2017.12"},{"key":"14_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/11604938_23","volume-title":"Information Security Applications","author":"E Oswald","year":"2006","unstructured":"Oswald, E., Schramm, K.: An efficient masking scheme for AES software implementations. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 292\u2013305. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11604938_23"},{"key":"14_CR41","doi-asserted-by":"crossref","unstructured":"Piazza, F., Uncini, A., Zenobi, M.: Neural networks with digital LUT activation functions. In: Proceedings of 1993 International Conference on Neural Networks (IJCNN-93-Nagoya, Japan), vol.\u00a02, pp. 1401\u20131404. IEEE (1993)","DOI":"10.1109\/IJCNN.1993.716806"},{"key":"14_CR42","doi-asserted-by":"crossref","unstructured":"Rumelhart, D.E., Hinton, G.E., McClelland, J.L., et al.: A general framework for parallel distributed processing. In: Parallel Distributed Processing: Explorations in the Microstructure of Cognition, vol. 1, no. 45\u201376, p. 26 (1986)","DOI":"10.7551\/mitpress\/5236.001.0001"},{"key":"14_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/978-3-662-48324-4_25","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2015","author":"T Schneider","year":"2015","unstructured":"Schneider, T., Moradi, A.: Leakage assessment methodology. In: G\u00fcneysu, T., Handschuh, H. (eds.) CHES 2015. LNCS, vol. 9293, pp. 495\u2013513. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48324-4_25"},{"key":"14_CR44","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1146\/annurev-bioeng-071516-044442","volume":"19","author":"D Shen","year":"2017","unstructured":"Shen, D., Wu, G., Suk, H.I.: Deep learning in medical image analysis. Annu. Rev. Biomed. Eng. 19, 221\u2013248 (2017)","journal-title":"Annu. Rev. Biomed. Eng."},{"key":"14_CR45","doi-asserted-by":"crossref","unstructured":"Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 3\u201318. IEEE (2017)","DOI":"10.1109\/SP.2017.41"},{"key":"14_CR46","doi-asserted-by":"crossref","unstructured":"Standaert, F.X.: Introduction to side-channel attacks. In: Secure Integrated Circuits and Systems, pp. 27\u201342 (2010)","DOI":"10.1007\/978-0-387-71829-3_2"},{"issue":"3","key":"14_CR47","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s12194-017-0406-5","volume":"10","author":"K Suzuki","year":"2017","unstructured":"Suzuki, K.: Overview of deep learning in medical imaging. Radiol. Phys. Technol. 10(3), 257\u2013273 (2017). https:\/\/doi.org\/10.1007\/s12194-017-0406-5","journal-title":"Radiol. Phys. Technol."},{"key":"14_CR48","doi-asserted-by":"crossref","unstructured":"Tandel, N.H., Prajapati, H.B., Dabhi, V.K.: Voice recognition and voice comparison using machine learning techniques: a survey. In: 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 459\u2013465. IEEE (2020)","DOI":"10.1109\/ICACCS48705.2020.9074184"},{"issue":"3","key":"14_CR49","doi-asserted-by":"publisher","first-page":"26","DOI":"10.2478\/popets-2019-0035","volume":"2019","author":"S Wagh","year":"2019","unstructured":"Wagh, S., Gupta, D., Chandran, N.: Securenn: 3-party secure computation for neural network training. Proc. Priv. Enhancing Technol. 2019(3), 26\u201349 (2019)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"14_CR50","unstructured":"Wang, Y., Paccagnella, R., He, E.T., Shacham, H., Fletcher, C.W., Kohlbrenner, D.: Hertzbleed: turning power $$\\{$$Side-Channel$$\\}$$ attacks into remote timing attacks on x86. In: 31st USENIX Security Symposium (USENIX Security 2022), pp. 679\u2013697 (2022)"},{"key":"14_CR51","doi-asserted-by":"crossref","unstructured":"Yu, H., Ma, H., Yang, K., Zhao, Y., Jin, Y.: Deepem: deep neural networks model recovery through EM side-channel information leakage. In: 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pp. 209\u2013218. IEEE (2020)","DOI":"10.1109\/HOST45689.2020.9300274"},{"key":"14_CR52","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Jia, R., Pei, H., Wang, W., Li, B., Song, D.: The secret revealer: generative model-inversion attacks against deep neural networks. In: Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, pp. 253\u2013261 (2020)","DOI":"10.1109\/CVPR42600.2020.00033"}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology \u2013 ICISC 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-5566-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:23:22Z","timestamp":1749846202000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-5566-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819655656","9789819655663"],"references-count":52,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-5566-3_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seoul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icisc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icisc.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}