語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security and Privacy in New Computin...
~
Meng, Weizhi.
Security and Privacy in New Computing Environments = Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Security and Privacy in New Computing Environments/ edited by Ding Wang, Weizhi Meng, Jinguang Han.
其他題名:
Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings /
其他作者:
Wang, Ding.
面頁冊數:
XIII, 462 p. 122 illus., 108 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer networks - Security measures. -
電子資源:
https://doi.org/10.1007/978-3-030-66922-5
ISBN:
9783030669225
Security and Privacy in New Computing Environments = Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings /
Security and Privacy in New Computing Environments
Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings /[electronic resource] :edited by Ding Wang, Weizhi Meng, Jinguang Han. - 1st ed. 2021. - XIII, 462 p. 122 illus., 108 illus. in color.online resource. - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,3441867-822X ;. - Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,154.
Network Security -- A Characterisation of Smart Grid DoS Attacks -- Security and Privacy in 5G Applications: Challenges and Solutions -- Alarm Elements based Adaptive Network Security Situation Prediction Model -- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback -- System Security -- Research on IoT Security Technology and Standardization in the 5G Era -- MIMEC Based Information System Security Situation Assessment Model -- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings -- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain -- Machine Learning -- Research on a Hybrid EMD-SVR Model for Time Series Prediction -- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity -- User Identity Linkage across Social Networks based on Neural Tensor Network -- An Efficient and Privacy-Preserving Physiological Case Classification Scheme for E-healthcare System -- A multi-class detection system for Android malicious Apps based on color image features -- Authentication and Access Control -- PUF-based Two-factor Group Authentication in Smart Home -- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems -- Access Control for Wireless Body Area Networks -- FIDO - that dog won’t hunt -- Blockchain-enabled user authentication in zero trust Internet of Things -- Cloud Security -- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage -- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain -- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data -- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration -- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing -- Cryptography -- Generative image steganography based on digital Cardan Grille -- Pixel Grouping Based Image Hashing for DIBR 3D Image -- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP -- Applied Cryptography -- A Verifiable Combinatorial Auction Scheme with Bidder’s Privacy Protection -- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query -- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User -- A3BAC: Attribute-Based Access Control Model with Anonymous Access -- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid.
This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.
ISBN: 9783030669225
Standard No.: 10.1007/978-3-030-66922-5doiSubjects--Topical Terms:
555385
Computer networks
--Security measures.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Security and Privacy in New Computing Environments = Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings /
LDR
:04632nam a22004095i 4500
001
1052198
003
DE-He213
005
20211012135144.0
007
cr nn 008mamaa
008
220103s2021 sz | s |||| 0|eng d
020
$a
9783030669225
$9
978-3-030-66922-5
024
7
$a
10.1007/978-3-030-66922-5
$2
doi
035
$a
978-3-030-66922-5
050
4
$a
TK5105.59
072
7
$a
UTN
$2
bicssc
072
7
$a
COM043050
$2
bisacsh
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
245
1 0
$a
Security and Privacy in New Computing Environments
$h
[electronic resource] :
$b
Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings /
$c
edited by Ding Wang, Weizhi Meng, Jinguang Han.
250
$a
1st ed. 2021.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2021.
300
$a
XIII, 462 p. 122 illus., 108 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
$x
1867-822X ;
$v
344
505
0
$a
Network Security -- A Characterisation of Smart Grid DoS Attacks -- Security and Privacy in 5G Applications: Challenges and Solutions -- Alarm Elements based Adaptive Network Security Situation Prediction Model -- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback -- System Security -- Research on IoT Security Technology and Standardization in the 5G Era -- MIMEC Based Information System Security Situation Assessment Model -- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings -- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain -- Machine Learning -- Research on a Hybrid EMD-SVR Model for Time Series Prediction -- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity -- User Identity Linkage across Social Networks based on Neural Tensor Network -- An Efficient and Privacy-Preserving Physiological Case Classification Scheme for E-healthcare System -- A multi-class detection system for Android malicious Apps based on color image features -- Authentication and Access Control -- PUF-based Two-factor Group Authentication in Smart Home -- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems -- Access Control for Wireless Body Area Networks -- FIDO - that dog won’t hunt -- Blockchain-enabled user authentication in zero trust Internet of Things -- Cloud Security -- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage -- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain -- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data -- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration -- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing -- Cryptography -- Generative image steganography based on digital Cardan Grille -- Pixel Grouping Based Image Hashing for DIBR 3D Image -- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP -- Applied Cryptography -- A Verifiable Combinatorial Auction Scheme with Bidder’s Privacy Protection -- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query -- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User -- A3BAC: Attribute-Based Access Control Model with Anonymous Access -- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid.
520
$a
This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Computer security.
$3
557122
650
0
$a
Data encryption (Computer science).
$3
1051084
650
0
$a
Application software.
$3
528147
650
1 4
$a
Mobile and Network Security.
$3
1211619
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Cryptology.
$3
1211076
650
2 4
$a
Security Services.
$3
1211616
650
2 4
$a
Computer Applications.
$3
669785
700
1
$a
Wang, Ding.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1228366
700
1
$a
Meng, Weizhi.
$e
editor.
$1
https://orcid.org/0000-0003-4384-5786
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1298060
700
1
$a
Han, Jinguang.
$e
editor.
$4
edt
$4
http://id.loc.gov/vocabulary/relators/edt
$3
1273991
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030669218
776
0 8
$i
Printed edition:
$z
9783030669232
830
0
$a
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
$x
1867-8211 ;
$v
154
$3
1253880
856
4 0
$u
https://doi.org/10.1007/978-3-030-66922-5
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
912
$a
ZDB-2-LNS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入