Security and Privacy in New Computing Environments
Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings
Herausgegeben:Wang, Ding; Meng, Weizhi; Han, Jinguang
Security and Privacy in New Computing Environments
Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings
Herausgegeben:Wang, Ding; Meng, Weizhi; Han, Jinguang
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually.
The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.
Andere Kunden interessierten sich auch für
- Mobile Computing, Applications, and Services37,99 €
- Design and Architecture for Signal and Image Processing44,99 €
- Distributed Computing and Intelligent Technology55,99 €
- Computer Science and Engineering in Health Services161,99 €
- Computer Science and Engineering in Health Services161,99 €
- 7th EAI International Conference on Computer Science and Engineering in Health Services161,99 €
- VLSI for Embedded Intelligence147,99 €
-
-
-
This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually.
The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.
The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.
Produktdetails
- Produktdetails
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-030-66921-8
- 1st ed. 2021
- Seitenzahl: 476
- Erscheinungstermin: 22. Januar 2021
- Englisch
- Abmessung: 235mm x 155mm x 26mm
- Gewicht: 715g
- ISBN-13: 9783030669218
- ISBN-10: 3030669211
- Artikelnr.: 60702443
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee
- Verlag: Springer / Springer International Publishing / Springer, Berlin
- Artikelnr. des Verlages: 978-3-030-66921-8
- 1st ed. 2021
- Seitenzahl: 476
- Erscheinungstermin: 22. Januar 2021
- Englisch
- Abmessung: 235mm x 155mm x 26mm
- Gewicht: 715g
- ISBN-13: 9783030669218
- ISBN-10: 3030669211
- Artikelnr.: 60702443
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Network Security.- A Characterisation of Smart Grid DoS Attacks.- Security and Privacy in 5G Applications: Challenges and Solutions.- Alarm Elements based Adaptive Network Security Situation Prediction Model.- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback.- System Security.- Research on IoT Security Technology and Standardization in the 5G Era.- MIMEC Based Information System Security Situation Assessment Model.- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings.- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain.- Machine Learning.- Research on a Hybrid EMD-SVR Model for Time Series Prediction.- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity.- User Identity Linkage across Social Networks based on Neural Tensor Network.- An Efficient and Privacy-Preserving Physiological Case Classification Scheme forE-healthcare System.- A multi-class detection system for Android malicious Apps based on color image features.- Authentication and Access Control.- PUF-based Two-factor Group Authentication in Smart Home.- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems.- Access Control for Wireless Body Area Networks.- FIDO - that dog won't hunt.- Blockchain-enabled user authentication in zero trust Internet of Things.- Cloud Security.- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage.- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain.- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data.- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration.- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing.- Cryptography.- Generative image steganography based on digital Cardan Grille.- Pixel Grouping Based Image Hashing for DIBR 3D Image.- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP.- Applied Cryptography.- A Verifiable Combinatorial Auction Scheme with Bidder's Privacy Protection.- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query.- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User.- A3BAC: Attribute-Based Access Control Model with Anonymous Access.- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid.
Network Security.- A Characterisation of Smart Grid DoS Attacks.- Security and Privacy in 5G Applications: Challenges and Solutions.- Alarm Elements based Adaptive Network Security Situation Prediction Model.- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback.- System Security.- Research on IoT Security Technology and Standardization in the 5G Era.- MIMEC Based Information System Security Situation Assessment Model.- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings.- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain.- Machine Learning.- Research on a Hybrid EMD-SVR Model for Time Series Prediction.- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity.- User Identity Linkage across Social Networks based on Neural Tensor Network.- An Efficient and Privacy-Preserving Physiological Case Classification Scheme forE-healthcare System.- A multi-class detection system for Android malicious Apps based on color image features.- Authentication and Access Control.- PUF-based Two-factor Group Authentication in Smart Home.- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems.- Access Control for Wireless Body Area Networks.- FIDO - that dog won't hunt.- Blockchain-enabled user authentication in zero trust Internet of Things.- Cloud Security.- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage.- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain.- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data.- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration.- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing.- Cryptography.- Generative image steganography based on digital Cardan Grille.- Pixel Grouping Based Image Hashing for DIBR 3D Image.- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP.- Applied Cryptography.- A Verifiable Combinatorial Auction Scheme with Bidder's Privacy Protection.- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query.- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User.- A3BAC: Attribute-Based Access Control Model with Anonymous Access.- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid.