語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security and privacy in new computin...
~
EAI International Conference on Security and Privacy in New Computing Environments (2021 :)
FindBook
Google Book
Amazon
博客來
Security and privacy in new computing environments = 4th EAI International Conference, SPNCE 2021, virtual event, December 10-11, 2021 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Security and privacy in new computing environments/ edited by Wenbo Shi, Xiaofeng Chen, Kim-Kwang Raymond Choo.
其他題名:
4th EAI International Conference, SPNCE 2021, virtual event, December 10-11, 2021 : proceedings /
其他題名:
SPNCE 2021
其他作者:
Shi, Wenbo.
團體作者:
EAI International Conference on Security and Privacy in New Computing Environments
出版者:
Cham :Springer International Publishing : : 2022.,
面頁冊數:
xiii, 396 p. :ill. (some col.), digital ;24 cm.
內容註:
Blockchain-based Outsourcing Shared Car Risk Prediction Scheme Design -- Fairness Protection Method of Vickery Auction Based on Smart Contract -- An Improved Needham-Schroeder Session Key Distribution Protocol For In-Vehicle CAN Network -- Research on Two-Party Cooperative Aigis-sig Digital Signature Protocol -- An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection -- A Lightweight PSIS Scheme Based on Multi-Node Collaboration in the IoT -- SAD: Website Fingerprint Defense based on Adversarial Examples -- A privacy-aware and time-limited data access control scheme with large universe and public traceability for Cloud-based IoD -- Multi-Party High-Dimensional Related Data Publishing via Probabilistic Principal Component Analysis and Differential Privacy -- ource code vulnerability detection method with multidimensional representation -- A Security Enhanced Verification Framework Based on Device Fingerprint in Internet of Things -- RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient -- Linear Policy Recommender Scheme for Large-Scale Attribute-based Access Control -- Non-interactive Privacy-preserving Naive Bayes Classifier Using Homomorphic Encryption -- BA-Audit: blockchain-based public auditing for aggregated data sharing in edge-assisted IoT -- Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System -- Threat Detection-Oriented Network Security Situation Assessment Method -- System Business Affecting Impact Analysis Method with Crossover Probability Theory -- RAP: A Lightweight Application Layer Defense against Website Fingerprinting -- FL-iotDP: Differential Private Federated Neural Network -- Analysis of Vulnerability of IPsec Protocol Implementation Based on Differential Fuzzing -- Honeywords Generation Method Based on Deep Learning and Rule-based Password Attack -- Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning -- GLV/GLS Scalar Multiplication on Twisted Edwards Curves -- Online Privacy of Personal Information - Perceptions v Reality -- ARTPHIL: Reversible de-identification of free-text using an integrated model Bayan -- CAFM: Precise Classication for Android Family Malware.
Contained By:
Springer Nature eBook
標題:
Computer security - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-030-96791-8
ISBN:
9783030967918
Security and privacy in new computing environments = 4th EAI International Conference, SPNCE 2021, virtual event, December 10-11, 2021 : proceedings /
Security and privacy in new computing environments
4th EAI International Conference, SPNCE 2021, virtual event, December 10-11, 2021 : proceedings /[electronic resource] :SPNCE 2021edited by Wenbo Shi, Xiaofeng Chen, Kim-Kwang Raymond Choo. - Cham :Springer International Publishing :2022. - xiii, 396 p. :ill. (some col.), digital ;24 cm. - Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,4231867-822X ;. - Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;423..
Blockchain-based Outsourcing Shared Car Risk Prediction Scheme Design -- Fairness Protection Method of Vickery Auction Based on Smart Contract -- An Improved Needham-Schroeder Session Key Distribution Protocol For In-Vehicle CAN Network -- Research on Two-Party Cooperative Aigis-sig Digital Signature Protocol -- An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection -- A Lightweight PSIS Scheme Based on Multi-Node Collaboration in the IoT -- SAD: Website Fingerprint Defense based on Adversarial Examples -- A privacy-aware and time-limited data access control scheme with large universe and public traceability for Cloud-based IoD -- Multi-Party High-Dimensional Related Data Publishing via Probabilistic Principal Component Analysis and Differential Privacy -- ource code vulnerability detection method with multidimensional representation -- A Security Enhanced Verification Framework Based on Device Fingerprint in Internet of Things -- RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient -- Linear Policy Recommender Scheme for Large-Scale Attribute-based Access Control -- Non-interactive Privacy-preserving Naive Bayes Classifier Using Homomorphic Encryption -- BA-Audit: blockchain-based public auditing for aggregated data sharing in edge-assisted IoT -- Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System -- Threat Detection-Oriented Network Security Situation Assessment Method -- System Business Affecting Impact Analysis Method with Crossover Probability Theory -- RAP: A Lightweight Application Layer Defense against Website Fingerprinting -- FL-iotDP: Differential Private Federated Neural Network -- Analysis of Vulnerability of IPsec Protocol Implementation Based on Differential Fuzzing -- Honeywords Generation Method Based on Deep Learning and Rule-based Password Attack -- Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning -- GLV/GLS Scalar Multiplication on Twisted Edwards Curves -- Online Privacy of Personal Information - Perceptions v Reality -- ARTPHIL: Reversible de-identification of free-text using an integrated model Bayan -- CAFM: Precise Classication for Android Family Malware.
This book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers were selected from 61 submissions and focus on security and privacy in new computing environments. The theme of SPNCE 2021 was "Secure Wireless Communication Systems: Infrastructure, Algorithms, and Management".
ISBN: 9783030967918
Standard No.: 10.1007/978-3-030-96791-8doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / E35 2021
Dewey Class. No.: 005.8
Security and privacy in new computing environments = 4th EAI International Conference, SPNCE 2021, virtual event, December 10-11, 2021 : proceedings /
LDR
:04007nmm a2200349 a 4500
001
2298307
003
DE-He213
005
20220312053519.0
006
m d
007
cr nn 008maaau
008
230324s2022 sz s 0 eng d
020
$a
9783030967918
$q
(electronic bk.)
020
$a
9783030967901
$q
(paper)
024
7
$a
10.1007/978-3-030-96791-8
$2
doi
035
$a
978-3-030-96791-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
E35 2021
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
E11 2021
111
2
$a
EAI International Conference on Security and Privacy in New Computing Environments
$n
(4th :
$d
2021 :
$c
Online)
$3
3594645
245
1 0
$a
Security and privacy in new computing environments
$h
[electronic resource] :
$b
4th EAI International Conference, SPNCE 2021, virtual event, December 10-11, 2021 : proceedings /
$c
edited by Wenbo Shi, Xiaofeng Chen, Kim-Kwang Raymond Choo.
246
3
$a
SPNCE 2021
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
xiii, 396 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
$x
1867-822X ;
$v
423
505
0
$a
Blockchain-based Outsourcing Shared Car Risk Prediction Scheme Design -- Fairness Protection Method of Vickery Auction Based on Smart Contract -- An Improved Needham-Schroeder Session Key Distribution Protocol For In-Vehicle CAN Network -- Research on Two-Party Cooperative Aigis-sig Digital Signature Protocol -- An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection -- A Lightweight PSIS Scheme Based on Multi-Node Collaboration in the IoT -- SAD: Website Fingerprint Defense based on Adversarial Examples -- A privacy-aware and time-limited data access control scheme with large universe and public traceability for Cloud-based IoD -- Multi-Party High-Dimensional Related Data Publishing via Probabilistic Principal Component Analysis and Differential Privacy -- ource code vulnerability detection method with multidimensional representation -- A Security Enhanced Verification Framework Based on Device Fingerprint in Internet of Things -- RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient -- Linear Policy Recommender Scheme for Large-Scale Attribute-based Access Control -- Non-interactive Privacy-preserving Naive Bayes Classifier Using Homomorphic Encryption -- BA-Audit: blockchain-based public auditing for aggregated data sharing in edge-assisted IoT -- Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System -- Threat Detection-Oriented Network Security Situation Assessment Method -- System Business Affecting Impact Analysis Method with Crossover Probability Theory -- RAP: A Lightweight Application Layer Defense against Website Fingerprinting -- FL-iotDP: Differential Private Federated Neural Network -- Analysis of Vulnerability of IPsec Protocol Implementation Based on Differential Fuzzing -- Honeywords Generation Method Based on Deep Learning and Rule-based Password Attack -- Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning -- GLV/GLS Scalar Multiplication on Twisted Edwards Curves -- Online Privacy of Personal Information - Perceptions v Reality -- ARTPHIL: Reversible de-identification of free-text using an integrated model Bayan -- CAFM: Precise Classication for Android Family Malware.
520
$a
This book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers were selected from 61 submissions and focus on security and privacy in new computing environments. The theme of SPNCE 2021 was "Secure Wireless Communication Systems: Infrastructure, Algorithms, and Management".
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Artificial Intelligence.
$3
769149
700
1
$a
Shi, Wenbo.
$3
1249746
700
1
$a
Chen, Xiaofeng.
$3
1279321
700
1
$a
Choo, Kim-Kwang Raymond.
$3
1001109
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;
$v
423.
$3
3594646
856
4 0
$u
https://doi.org/10.1007/978-3-030-96791-8
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9440199
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 E35 2021
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入