Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security and privacy in new computin...
~
EAI International Conference on Security and Privacy in New Computing Environments (2021 :)
Linked to FindBook
Google Book
Amazon
博客來
Security and privacy in new computing environments = 4th EAI International Conference, SPNCE 2021, virtual event, December 10-11, 2021 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Security and privacy in new computing environments/ edited by Wenbo Shi, Xiaofeng Chen, Kim-Kwang Raymond Choo.
Reminder of title:
4th EAI International Conference, SPNCE 2021, virtual event, December 10-11, 2021 : proceedings /
remainder title:
SPNCE 2021
other author:
Shi, Wenbo.
corporate name:
EAI International Conference on Security and Privacy in New Computing Environments
Published:
Cham :Springer International Publishing : : 2022.,
Description:
xiii, 396 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Blockchain-based Outsourcing Shared Car Risk Prediction Scheme Design -- Fairness Protection Method of Vickery Auction Based on Smart Contract -- An Improved Needham-Schroeder Session Key Distribution Protocol For In-Vehicle CAN Network -- Research on Two-Party Cooperative Aigis-sig Digital Signature Protocol -- An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection -- A Lightweight PSIS Scheme Based on Multi-Node Collaboration in the IoT -- SAD: Website Fingerprint Defense based on Adversarial Examples -- A privacy-aware and time-limited data access control scheme with large universe and public traceability for Cloud-based IoD -- Multi-Party High-Dimensional Related Data Publishing via Probabilistic Principal Component Analysis and Differential Privacy -- ource code vulnerability detection method with multidimensional representation -- A Security Enhanced Verification Framework Based on Device Fingerprint in Internet of Things -- RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient -- Linear Policy Recommender Scheme for Large-Scale Attribute-based Access Control -- Non-interactive Privacy-preserving Naive Bayes Classifier Using Homomorphic Encryption -- BA-Audit: blockchain-based public auditing for aggregated data sharing in edge-assisted IoT -- Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System -- Threat Detection-Oriented Network Security Situation Assessment Method -- System Business Affecting Impact Analysis Method with Crossover Probability Theory -- RAP: A Lightweight Application Layer Defense against Website Fingerprinting -- FL-iotDP: Differential Private Federated Neural Network -- Analysis of Vulnerability of IPsec Protocol Implementation Based on Differential Fuzzing -- Honeywords Generation Method Based on Deep Learning and Rule-based Password Attack -- Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning -- GLV/GLS Scalar Multiplication on Twisted Edwards Curves -- Online Privacy of Personal Information - Perceptions v Reality -- ARTPHIL: Reversible de-identification of free-text using an integrated model Bayan -- CAFM: Precise Classication for Android Family Malware.
Contained By:
Springer Nature eBook
Subject:
Computer security - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-030-96791-8
ISBN:
9783030967918
Security and privacy in new computing environments = 4th EAI International Conference, SPNCE 2021, virtual event, December 10-11, 2021 : proceedings /
Security and privacy in new computing environments
4th EAI International Conference, SPNCE 2021, virtual event, December 10-11, 2021 : proceedings /[electronic resource] :SPNCE 2021edited by Wenbo Shi, Xiaofeng Chen, Kim-Kwang Raymond Choo. - Cham :Springer International Publishing :2022. - xiii, 396 p. :ill. (some col.), digital ;24 cm. - Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,4231867-822X ;. - Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;423..
Blockchain-based Outsourcing Shared Car Risk Prediction Scheme Design -- Fairness Protection Method of Vickery Auction Based on Smart Contract -- An Improved Needham-Schroeder Session Key Distribution Protocol For In-Vehicle CAN Network -- Research on Two-Party Cooperative Aigis-sig Digital Signature Protocol -- An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection -- A Lightweight PSIS Scheme Based on Multi-Node Collaboration in the IoT -- SAD: Website Fingerprint Defense based on Adversarial Examples -- A privacy-aware and time-limited data access control scheme with large universe and public traceability for Cloud-based IoD -- Multi-Party High-Dimensional Related Data Publishing via Probabilistic Principal Component Analysis and Differential Privacy -- ource code vulnerability detection method with multidimensional representation -- A Security Enhanced Verification Framework Based on Device Fingerprint in Internet of Things -- RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient -- Linear Policy Recommender Scheme for Large-Scale Attribute-based Access Control -- Non-interactive Privacy-preserving Naive Bayes Classifier Using Homomorphic Encryption -- BA-Audit: blockchain-based public auditing for aggregated data sharing in edge-assisted IoT -- Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System -- Threat Detection-Oriented Network Security Situation Assessment Method -- System Business Affecting Impact Analysis Method with Crossover Probability Theory -- RAP: A Lightweight Application Layer Defense against Website Fingerprinting -- FL-iotDP: Differential Private Federated Neural Network -- Analysis of Vulnerability of IPsec Protocol Implementation Based on Differential Fuzzing -- Honeywords Generation Method Based on Deep Learning and Rule-based Password Attack -- Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning -- GLV/GLS Scalar Multiplication on Twisted Edwards Curves -- Online Privacy of Personal Information - Perceptions v Reality -- ARTPHIL: Reversible de-identification of free-text using an integrated model Bayan -- CAFM: Precise Classication for Android Family Malware.
This book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers were selected from 61 submissions and focus on security and privacy in new computing environments. The theme of SPNCE 2021 was "Secure Wireless Communication Systems: Infrastructure, Algorithms, and Management".
ISBN: 9783030967918
Standard No.: 10.1007/978-3-030-96791-8doiSubjects--Topical Terms:
622818
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / E35 2021
Dewey Class. No.: 005.8
Security and privacy in new computing environments = 4th EAI International Conference, SPNCE 2021, virtual event, December 10-11, 2021 : proceedings /
LDR
:04007nmm a2200349 a 4500
001
2298307
003
DE-He213
005
20220312053519.0
006
m d
007
cr nn 008maaau
008
230324s2022 sz s 0 eng d
020
$a
9783030967918
$q
(electronic bk.)
020
$a
9783030967901
$q
(paper)
024
7
$a
10.1007/978-3-030-96791-8
$2
doi
035
$a
978-3-030-96791-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
E35 2021
072
7
$a
UKN
$2
bicssc
072
7
$a
COM075000
$2
bisacsh
072
7
$a
UKN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
E11 2021
111
2
$a
EAI International Conference on Security and Privacy in New Computing Environments
$n
(4th :
$d
2021 :
$c
Online)
$3
3594645
245
1 0
$a
Security and privacy in new computing environments
$h
[electronic resource] :
$b
4th EAI International Conference, SPNCE 2021, virtual event, December 10-11, 2021 : proceedings /
$c
edited by Wenbo Shi, Xiaofeng Chen, Kim-Kwang Raymond Choo.
246
3
$a
SPNCE 2021
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
xiii, 396 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
$x
1867-822X ;
$v
423
505
0
$a
Blockchain-based Outsourcing Shared Car Risk Prediction Scheme Design -- Fairness Protection Method of Vickery Auction Based on Smart Contract -- An Improved Needham-Schroeder Session Key Distribution Protocol For In-Vehicle CAN Network -- Research on Two-Party Cooperative Aigis-sig Digital Signature Protocol -- An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection -- A Lightweight PSIS Scheme Based on Multi-Node Collaboration in the IoT -- SAD: Website Fingerprint Defense based on Adversarial Examples -- A privacy-aware and time-limited data access control scheme with large universe and public traceability for Cloud-based IoD -- Multi-Party High-Dimensional Related Data Publishing via Probabilistic Principal Component Analysis and Differential Privacy -- ource code vulnerability detection method with multidimensional representation -- A Security Enhanced Verification Framework Based on Device Fingerprint in Internet of Things -- RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient -- Linear Policy Recommender Scheme for Large-Scale Attribute-based Access Control -- Non-interactive Privacy-preserving Naive Bayes Classifier Using Homomorphic Encryption -- BA-Audit: blockchain-based public auditing for aggregated data sharing in edge-assisted IoT -- Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System -- Threat Detection-Oriented Network Security Situation Assessment Method -- System Business Affecting Impact Analysis Method with Crossover Probability Theory -- RAP: A Lightweight Application Layer Defense against Website Fingerprinting -- FL-iotDP: Differential Private Federated Neural Network -- Analysis of Vulnerability of IPsec Protocol Implementation Based on Differential Fuzzing -- Honeywords Generation Method Based on Deep Learning and Rule-based Password Attack -- Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning -- GLV/GLS Scalar Multiplication on Twisted Edwards Curves -- Online Privacy of Personal Information - Perceptions v Reality -- ARTPHIL: Reversible de-identification of free-text using an integrated model Bayan -- CAFM: Precise Classication for Android Family Malware.
520
$a
This book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers were selected from 61 submissions and focus on security and privacy in new computing environments. The theme of SPNCE 2021 was "Secure Wireless Communication Systems: Infrastructure, Algorithms, and Management".
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Artificial Intelligence.
$3
769149
700
1
$a
Shi, Wenbo.
$3
1249746
700
1
$a
Chen, Xiaofeng.
$3
1279321
700
1
$a
Choo, Kim-Kwang Raymond.
$3
1001109
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;
$v
423.
$3
3594646
856
4 0
$u
https://doi.org/10.1007/978-3-030-96791-8
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9440199
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 E35 2021
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login