This book constitutes the refereed proceedings of the 5 th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022, held in Xi'an, china, in December 30-31, 2022. The 12 full papers were selected from 38 submissions and are grouped in thematical parts as: authentication and key agreement; data security; network security.
This book constitutes the refereed proceedings of the 5th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022, held in Xi'an, china, in December 30-31, 2022.
The 12 full papers were selected from 38 submissions and are grouped in thematical parts as: authentication and key agreement; data security; network security.
Produktdetails
Produktdetails
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Enginee
Authentication and key agreement.- User Authentication Using Body Vibration Characteristics.- An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server.- Efficient two-party authentication key agreement protocol using reconciliation mechanism from lattice.- Anonymous and Practical Multi-Factor Authentication for Mobile Devices Using Two-Server Architecture.- Data security.- Cross-chain Data Auditing for Medical IoT Data.- Outsourced Privacy-Preserving SVM Classifier Model over Encrypted Data in IoT.- A Scheme of Anti Gradient Leakage of Federated Learning Based on Blockchain.- Analysis of a New Improved AES S-box Structure Rong.- Network security.- Social Internet of Tings trust management based on implicit social relationship.- Romeo: SGX-based Software Anti-Piracy Framework.- P-TECS: An Energy Balance Algorithm for Opportunistic Networks Integrating Multiple Node Attributes.- Network Situation Awareness Model based on Incomplete Information Game.
Authentication and key agreement.- User Authentication Using Body Vibration Characteristics.- An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server.- Efficient two-party authentication key agreement protocol using reconciliation mechanism from lattice.- Anonymous and Practical Multi-Factor Authentication for Mobile Devices Using Two-Server Architecture.- Data security.- Cross-chain Data Auditing for Medical IoT Data.- Outsourced Privacy-Preserving SVM Classifier Model over Encrypted Data in IoT.- A Scheme of Anti Gradient Leakage of Federated Learning Based on Blockchain.- Analysis of a New Improved AES S-box Structure Rong.- Network security.- Social Internet of Tings trust management based on implicit social relationship.- Romeo: SGX-based Software Anti-Piracy Framework.- P-TECS: An Energy Balance Algorithm for Opportunistic Networks Integrating Multiple Node Attributes.- Network Situation Awareness Model based on Incomplete Information Game.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497