This volume constitutes selected papers presented at the Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022. Due to COVID-19, EISA 2022 was held fully online. The 13 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice.
This volume constitutes selected papers presented at the Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022. Due to COVID-19, EISA 2022 was held fully online.
The 13 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice.
Produktdetails
Produktdetails
Communications in Computer and Information Science 1641
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
Asymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.- A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks.- Towards Low-Latency Big Data Infrastructure at Sangfor.- Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB.- Parallel Validity Analysis of the Boomerang Attack Model.- A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography.- Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis without q-type assumption.- AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels.- HBMD-FL:Heterogeneous Federated Learning Algorithm Based On Blockchain and Model Distillation.- Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET.- An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy.- D2CDIM:DID-based Decentralized Cross-domain Identity Management with Privacy-Preservation and Sybil-Resistance.- Link Aware Aggregation Query with Privacy-preserving Capability in Wireless Sensor Networks.
Asymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.- A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks.- Towards Low-Latency Big Data Infrastructure at Sangfor.- Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB.- Parallel Validity Analysis of the Boomerang Attack Model.- A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography.- Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis without q-type assumption.- AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels.- HBMD-FL:Heterogeneous Federated Learning Algorithm Based On Blockchain and Model Distillation.- Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET.- An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy.- D2CDIM:DID-based Decentralized Cross-domain Identity Management with Privacy-Preservation and Sybil-Resistance.- Link Aware Aggregation Query with Privacy-preserving Capability in Wireless Sensor Networks.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826