語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Network and system security = 10th I...
~
Workshop on the Preservation of Stability under Discretization ((2001 :)
Network and system security = 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Network and system security/ edited by Jiageng Chen ... [et al.].
其他題名:
10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings /
其他題名:
NSS 2016
其他作者:
Chen, Jiageng.
團體作者:
Workshop on the Preservation of Stability under Discretization
出版者:
Cham :Springer International Publishing : : 2016.,
面頁冊數:
xiv, 540 p. :ill., digital ; : 24 cm.;
Contained By:
Springer eBooks
標題:
Computer security - Congresses. -
電子資源:
http://dx.doi.org/10.1007/978-3-319-46298-1
ISBN:
9783319462981
Network and system security = 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings /
Network and system security
10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings /[electronic resource] :NSS 2016edited by Jiageng Chen ... [et al.]. - Cham :Springer International Publishing :2016. - xiv, 540 p. :ill., digital ;24 cm. - Lecture notes in computer science,99550302-9743 ;. - Lecture notes in computer science ;6140..
Invited paper -- While Mobile Encounters with Clouds -- Authentication Mechanism -- Multi-Device Anonymous Authentication -- A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism -- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications -- Cloud Computing Security -- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing -- An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments -- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms -- Data Mining for Security Application -- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security -- Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade -- Digital Signature -- Two-in-One Oblivious Signatures Secure in the Random Oracle Model -- A New Transitive Signature Scheme -- Privacy-preserving Technologies -- Privacy-Preserving Profile Matching Protocol Considering Conditions -- Privacy Preserving Credit Systems -- Evading System-Calls Based Intrusion Detection Systems -- Network Security and Forensic -- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks -- A Network Timestamp Verification Mechanism for Forensic Analysis -- Searchable Encryption -- An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords -- Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards -- A System of Shareable Keyword Search on Encrypted Data -- Security Policy and Access Control -- An Attribute Based Protection Model for JSON Documents -- The GURA-G Administrative Model for User and Group Attribute Assignment -- On the relationship between finite domain ABAM and PreUCONA -- Security Protocols -- MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication -- Expressive Rating Scheme by Signatures with Predications on Ratees -- Symmetric Key Cryptography -- A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers -- Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR -- System Security -- DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern -- PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks -- Iris Cancellable Template Generation based on Indexing-First-One Hashing -- Web Security -- Detecting Malicious URLs Using Lexical Analysis -- Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo -- Data Mining for Security Application (Short Paper) -- Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining -- Provable Seucirty (Short Paper) -- Improved Security Proofs for Modular Exponentiation Bits -- Security Protocol (Short Paper) -- Secure Outsourced Bilinear Pairings Computation for Mobile Devices -- The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix.
This book constitutes the proceedings of the 10th International Conference on Network and System Security, NSS 2016, held in Taipei, Taiwan, in September 2016. The 31 full and 4 short papers presented in this volume were carefully reviewed and selected from 105 submissions. They were organized in topical sections named: authentication mechanism; cloud computing security; data mining for security application; privacy-preserving technologies; network security and forensics; searchable encryption; security policy and access control; security protocols, symmetric key cryptography; system security; Web security. The volume also contains one invited paper.
ISBN: 9783319462981
Standard No.: 10.1007/978-3-319-46298-1doiSubjects--Topical Terms:
574522
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Network and system security = 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings /
LDR
:05011nam a2200349 a 4500
001
867006
003
DE-He213
005
20160920053925.0
006
m d
007
cr nn 008maaau
008
170720s2016 gw s 0 eng d
020
$a
9783319462981
$q
(electronic bk.)
020
$a
9783319462974
$q
(paper)
024
7
$a
10.1007/978-3-319-46298-1
$2
doi
035
$a
978-3-319-46298-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
I61 2016
111
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
245
1 0
$a
Network and system security
$h
[electronic resource] :
$b
10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016 : proceedings /
$c
edited by Jiageng Chen ... [et al.].
246
3
$a
NSS 2016
260
$a
Cham :
$c
2016.
$b
Springer International Publishing :
$b
Imprint: Springer,
300
$a
xiv, 540 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
9955
505
0
$a
Invited paper -- While Mobile Encounters with Clouds -- Authentication Mechanism -- Multi-Device Anonymous Authentication -- A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism -- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications -- Cloud Computing Security -- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing -- An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments -- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms -- Data Mining for Security Application -- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security -- Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade -- Digital Signature -- Two-in-One Oblivious Signatures Secure in the Random Oracle Model -- A New Transitive Signature Scheme -- Privacy-preserving Technologies -- Privacy-Preserving Profile Matching Protocol Considering Conditions -- Privacy Preserving Credit Systems -- Evading System-Calls Based Intrusion Detection Systems -- Network Security and Forensic -- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks -- A Network Timestamp Verification Mechanism for Forensic Analysis -- Searchable Encryption -- An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords -- Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards -- A System of Shareable Keyword Search on Encrypted Data -- Security Policy and Access Control -- An Attribute Based Protection Model for JSON Documents -- The GURA-G Administrative Model for User and Group Attribute Assignment -- On the relationship between finite domain ABAM and PreUCONA -- Security Protocols -- MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication -- Expressive Rating Scheme by Signatures with Predications on Ratees -- Symmetric Key Cryptography -- A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers -- Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR -- System Security -- DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern -- PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks -- Iris Cancellable Template Generation based on Indexing-First-One Hashing -- Web Security -- Detecting Malicious URLs Using Lexical Analysis -- Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo -- Data Mining for Security Application (Short Paper) -- Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining -- Provable Seucirty (Short Paper) -- Improved Security Proofs for Modular Exponentiation Bits -- Security Protocol (Short Paper) -- Secure Outsourced Bilinear Pairings Computation for Mobile Devices -- The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix.
520
$a
This book constitutes the proceedings of the 10th International Conference on Network and System Security, NSS 2016, held in Taipei, Taiwan, in September 2016. The 31 full and 4 short papers presented in this volume were carefully reviewed and selected from 105 submissions. They were organized in topical sections named: authentication mechanism; cloud computing security; data mining for security application; privacy-preserving technologies; network security and forensics; searchable encryption; security policy and access control; security protocols, symmetric key cryptography; system security; Web security. The volume also contains one invited paper.
650
0
$a
Computer security
$v
Congresses.
$3
574522
$3
727780
650
1 4
$a
Computer Science.
$3
593922
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Data Encryption.
$3
669790
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Management of Computing and Information Systems.
$3
593928
650
2 4
$a
Computers and Society.
$3
669900
650
2 4
$a
Information Systems and Communication Service.
$3
669203
700
1
$a
Chen, Jiageng.
$3
1113529
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
6140.
$3
744199
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-46298-1
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入