語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security, privacy, and anonymity in ...
~
Workshop on the Preservation of Stability under Discretization ((2001 :)
Security, privacy, and anonymity in computation, communication, and storage = 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018 : proceedings /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Security, privacy, and anonymity in computation, communication, and storage/ edited by Guojun Wang, Jinjun Chen, Laurence T. Yang.
其他題名:
11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018 : proceedings /
其他題名:
SpaCCS 2018
其他作者:
Wang, Guojun.
團體作者:
Workshop on the Preservation of Stability under Discretization
出版者:
Cham :Springer International Publishing : : 2018.,
面頁冊數:
xv, 534 p. :ill. (some col.), digital ; : 24 cm.;
Contained By:
Springer eBooks
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-030-05345-1
ISBN:
9783030053451
Security, privacy, and anonymity in computation, communication, and storage = 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018 : proceedings /
Security, privacy, and anonymity in computation, communication, and storage
11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018 : proceedings /[electronic resource] :SpaCCS 2018edited by Guojun Wang, Jinjun Chen, Laurence T. Yang. - Cham :Springer International Publishing :2018. - xv, 534 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,113420302-9743 ;. - Lecture notes in computer science ;6140..
Protecting Your Smartphone from Theft Using Accelerometer -- SOS - Securing Open Skies DNS Traffic of a Tor Exit Node - An Analysis -- SDN-Based Secure VANETs Communication with Fog Computing -- Wearable Device Data for Criminal Investigation -- Authentication of Skyline Query over Road Networks -- A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing -- Processing Analysis of Confidential Modes of Operation -- Matching Sensor Ontologies through Compact Evolutionary Tabu Search Algorithm -- Event-triggered Fault-detection Filter using Coordinate Transformation Approach for Time-varying Stochastic Systems -- Indoor Interference Classification Based on WiFi Channel State Information -- Secure and Privacy Preserving RFID Based Access Control to Smart Buildings -- Answering the Min-cost Quality-aware Query on Multi-sources in Sensor-Cloud Systems -- Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud Environment -- A Four-stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Application of Sensor-Cloud Systems: Smart Traffic Control -- Strategy-Proof Mechanism for Provisioning Nonobedient Resources Without Payment -- Risk Identification-based Association Rule Mining for Supply Chain Big Data -- TrCMP: An App Usage Inference Method for Mobile Service Enhancement -- A High-performance Adaptive Strategy of Container Checkpoint Based on Pre-replication -- Cloud Enabled e-glossary System: A Smart Campus Perspective -- A Dynamic Integrity Transitivity Model for the Cloud -- Enhancing Dependability in Big Data Analytics Enterprise Pipelines -- Overview of Logistics Equilibrium Distribution Networks System: An Urban Perspective -- CRAB: Blockchain Based Criminal Record Management System -- Secure Passive Keyless Entry and Start System Using Machine Learning -- Towards New Privacy Regulations in Europe: Users' Privacy Perception in Recommender Systems -- SafeTECKS: Protect Data Safety in Things-Edge-Cloud Architecture with Knowledge Sharing -- NTRDM: A New Bus Line Network Optimization Method Based on Taxi Passenger Flow Conversion -- BDCP:A Framework for Big Data Copyright Protection Based on Digital Watermarking -- A Privacy-preserving Attribute-Based Access Control Scheme -- Checking an Authentication of Person Depends on RFID with Thermal Image -- Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social Networks -- An efficient provable multi-copy data possession scheme with data dynamics -- An Enhanced Key Management Scheme for LoRaWAN -- Identifying Devices of the Internet of Things using Machine Learning on Clock Characteristics -- A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical Systems -- Interacting with the Internet of Things using Smart Contracts and Blockchain Technologies -- Research on Multi-Focus Image Fusion Algorithm Based on Quadtree -- Uncertainty Evaluation for Big Data of Mass Standards in a Key Comparison -- Research on Wireless Spectrum Sensing Technology Based on Machine Learning -- The Safety Detection for Double Tapered Roller Bearing Based on Deep Learning -- Malicious Domain Name Recognition Based on Deep Neural Networks -- Investigation on Unauthorized Human Activity Watching through Leveraging Wi-Fi Signals -- E2STA: An Energy-Efficient Spatio-Temporal Query Algorithm for Wireless Sensor Networks.
This book constitutes the refereed proceedings of the 11th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage. The 45 revised full papers were carefully reviewed and selected from 120 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.
ISBN: 9783030053451
Standard No.: 10.1007/978-3-030-05345-1doiSubjects--Topical Terms:
574522
Computer security
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Security, privacy, and anonymity in computation, communication, and storage = 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018 : proceedings /
LDR
:05464nam a2200361 a 4500
001
930446
003
DE-He213
005
20181207150831.0
006
m d
007
cr nn 008maaau
008
190627s2018 gw s 0 eng d
020
$a
9783030053451
$q
(electronic bk.)
020
$a
9783030053444
$q
(paper)
024
7
$a
10.1007/978-3-030-05345-1
$2
doi
035
$a
978-3-030-05345-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
S732 2018
111
2
$a
Workshop on the Preservation of Stability under Discretization
$d
(2001 :
$c
Fort Collins, Colo.)
$3
527686
245
1 0
$a
Security, privacy, and anonymity in computation, communication, and storage
$h
[electronic resource] :
$b
11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018 : proceedings /
$c
edited by Guojun Wang, Jinjun Chen, Laurence T. Yang.
246
3
$a
SpaCCS 2018
260
$a
Cham :
$c
2018.
$b
Springer International Publishing :
$b
Imprint: Springer,
300
$a
xv, 534 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
11342
490
1
$a
Information systems and applications, incl. internet/web, and HCI
505
0
$a
Protecting Your Smartphone from Theft Using Accelerometer -- SOS - Securing Open Skies DNS Traffic of a Tor Exit Node - An Analysis -- SDN-Based Secure VANETs Communication with Fog Computing -- Wearable Device Data for Criminal Investigation -- Authentication of Skyline Query over Road Networks -- A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing -- Processing Analysis of Confidential Modes of Operation -- Matching Sensor Ontologies through Compact Evolutionary Tabu Search Algorithm -- Event-triggered Fault-detection Filter using Coordinate Transformation Approach for Time-varying Stochastic Systems -- Indoor Interference Classification Based on WiFi Channel State Information -- Secure and Privacy Preserving RFID Based Access Control to Smart Buildings -- Answering the Min-cost Quality-aware Query on Multi-sources in Sensor-Cloud Systems -- Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud Environment -- A Four-stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Application of Sensor-Cloud Systems: Smart Traffic Control -- Strategy-Proof Mechanism for Provisioning Nonobedient Resources Without Payment -- Risk Identification-based Association Rule Mining for Supply Chain Big Data -- TrCMP: An App Usage Inference Method for Mobile Service Enhancement -- A High-performance Adaptive Strategy of Container Checkpoint Based on Pre-replication -- Cloud Enabled e-glossary System: A Smart Campus Perspective -- A Dynamic Integrity Transitivity Model for the Cloud -- Enhancing Dependability in Big Data Analytics Enterprise Pipelines -- Overview of Logistics Equilibrium Distribution Networks System: An Urban Perspective -- CRAB: Blockchain Based Criminal Record Management System -- Secure Passive Keyless Entry and Start System Using Machine Learning -- Towards New Privacy Regulations in Europe: Users' Privacy Perception in Recommender Systems -- SafeTECKS: Protect Data Safety in Things-Edge-Cloud Architecture with Knowledge Sharing -- NTRDM: A New Bus Line Network Optimization Method Based on Taxi Passenger Flow Conversion -- BDCP:A Framework for Big Data Copyright Protection Based on Digital Watermarking -- A Privacy-preserving Attribute-Based Access Control Scheme -- Checking an Authentication of Person Depends on RFID with Thermal Image -- Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social Networks -- An efficient provable multi-copy data possession scheme with data dynamics -- An Enhanced Key Management Scheme for LoRaWAN -- Identifying Devices of the Internet of Things using Machine Learning on Clock Characteristics -- A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical Systems -- Interacting with the Internet of Things using Smart Contracts and Blockchain Technologies -- Research on Multi-Focus Image Fusion Algorithm Based on Quadtree -- Uncertainty Evaluation for Big Data of Mass Standards in a Key Comparison -- Research on Wireless Spectrum Sensing Technology Based on Machine Learning -- The Safety Detection for Double Tapered Roller Bearing Based on Deep Learning -- Malicious Domain Name Recognition Based on Deep Neural Networks -- Investigation on Unauthorized Human Activity Watching through Leveraging Wi-Fi Signals -- E2STA: An Energy-Efficient Spatio-Temporal Query Algorithm for Wireless Sensor Networks.
520
$a
This book constitutes the refereed proceedings of the 11th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage. The 45 revised full papers were carefully reviewed and selected from 120 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.
650
0
$a
Computer security
$v
Congresses.
$3
574522
$3
727780
650
0
$a
Computer networks
$x
Security measures
$v
Congresses.
$3
574534
$3
727814
650
0
$a
Data protection
$v
Congresses.
$3
596971
$3
727841
650
1 4
$a
Security.
$3
1114130
650
2 4
$a
Computer Systems Organization and Communication Networks.
$3
669309
650
2 4
$a
Information Systems and Communication Service.
$3
669203
650
2 4
$a
Artificial Intelligence.
$3
646849
700
1
$a
Wang, Guojun.
$3
1051571
700
1
$a
Chen, Jinjun.
$3
791870
700
1
$a
Yang, Laurence T.
$3
675654
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
6140.
$3
744199
830
0
$a
Information systems and applications, incl. internet/web, and HCI.
$3
1208311
856
4 0
$u
https://doi.org/10.1007/978-3-030-05345-1
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入