This book includes extended and revised versions of a set of selected papers presented at the 19th International Conference on Smart Business Technologies, ICSBT 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International Conference on Security and Cryptography, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022. The 7 full papers included in the volume were carefully selected from the 143 submissions accepted to participate in the conference. The papers present reciting research on e-Business technology and its current applications; and all aspects of security and privacy.
This book includes extended and revised versions of a set of selected papers presented at the 19th International Conference on Smart Business Technologies, ICSBT 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International Conference on Security and Cryptography, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022. The 7 full papers included in the volume were carefully selected from the 143 submissions accepted to participate in the conference. The papers present reciting research on e-Business technology and its current applications; and all aspects of security and privacy.
Produktdetails
Produktdetails
Communications in Computer and Information Science 1849
SPOT+: Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over Multiple Contact Information.- Blind side channel on the Elephant LFSR Extended version.- Stacked Ensemble Models Evaluation on DL Based SCA.- Explaining the Use of Cryptographic API in Android Malware.- Explaining the Use of Cryptographic API in Android Malware.- Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and their Mitigation.- Compressing Big OLAP Data Cubes in Big Data Analytics Systems: New Paradigms, a Reference Architecture, and Future Research Perspectives.
SPOT+: Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over Multiple Contact Information.- Blind side channel on the Elephant LFSR Extended version.- Stacked Ensemble Models Evaluation on DL Based SCA.- Explaining the Use of Cryptographic API in Android Malware.- Explaining the Use of Cryptographic API in Android Malware.- Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and their Mitigation.- Compressing Big OLAP Data Cubes in Big Data Analytics Systems: New Paradigms, a Reference Architecture, and Future Research Perspectives.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497