Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cyberspace safety and security = 14t...
~
CSS (Conference) (2022 :)
Linked to FindBook
Google Book
Amazon
博客來
Cyberspace safety and security = 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022 : proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cyberspace safety and security/ edited by Xiaofeng Chen, Jian Shen, Willy Susilo.
Reminder of title:
14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022 : proceedings /
remainder title:
CSS 2022
other author:
Chen, Xiaofeng.
corporate name:
CSS (Conference)
Published:
Cham :Springer International Publishing : : 2022.,
Description:
xiii, 376 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
Cryptography and its applications -- Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead -- Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare -- Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q) -- A Collaborative Access Control Scheme based on Incentive Mechanism -- Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing -- Updatable Hybrid Encryption Scheme with No-directional Key Update for Cloud Storage -- Data security -- FDLedger: Dynamic and Efficient Anonymous Audit for Distributed Ledgers -- A Method of Traceless File Deletion for NTFS File System -- Efficient and Collusion Resistant Multi-Party Private Set Intersection Protocols for Large Participants and Small Sets Setting -- Attack and defense techniques -- High Quality Audio Adversarial Examples without Using Psychoacoustics -- Working Mechanism of Eternalblue and Its Application in Ransomworm -- Substitution Attacks against Sigma Protocols -- A Multi-stage APT Attack Detection Method based on Sample Enhancement -- VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer -- Network security and its applications -- Improvised Model for Blockchain in Distributed Cloud Environment -- Multi-hop Multi-key Homomorphic Encryption with Less Noise under CRS Model -- Design of Anti-machine Learning Malicious Node System based on Blockchain.
Contained By:
Springer Nature eBook
Subject:
Data encryption (Computer science) - Congresses. -
Online resource:
https://doi.org/10.1007/978-3-031-18067-5
ISBN:
9783031180675
Cyberspace safety and security = 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022 : proceedings /
Cyberspace safety and security
14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022 : proceedings /[electronic resource] :CSS 2022edited by Xiaofeng Chen, Jian Shen, Willy Susilo. - Cham :Springer International Publishing :2022. - xiii, 376 p. :ill. (some col.), digital ;24 cm. - Lecture notes in computer science,135470302-9743 ;. - Lecture notes in computer science ;13547..
Cryptography and its applications -- Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead -- Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare -- Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q) -- A Collaborative Access Control Scheme based on Incentive Mechanism -- Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing -- Updatable Hybrid Encryption Scheme with No-directional Key Update for Cloud Storage -- Data security -- FDLedger: Dynamic and Efficient Anonymous Audit for Distributed Ledgers -- A Method of Traceless File Deletion for NTFS File System -- Efficient and Collusion Resistant Multi-Party Private Set Intersection Protocols for Large Participants and Small Sets Setting -- Attack and defense techniques -- High Quality Audio Adversarial Examples without Using Psychoacoustics -- Working Mechanism of Eternalblue and Its Application in Ransomworm -- Substitution Attacks against Sigma Protocols -- A Multi-stage APT Attack Detection Method based on Sample Enhancement -- VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer -- Network security and its applications -- Improvised Model for Blockchain in Distributed Cloud Environment -- Multi-hop Multi-key Homomorphic Encryption with Less Noise under CRS Model -- Design of Anti-machine Learning Malicious Node System based on Blockchain.
This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace Safety and Security, CSS 2022, held in Xi'an, China, in October 2022.The 26 revised full papers presented were carefully reviewed and selected from 104 initial submissions. The papers focus on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.
ISBN: 9783031180675
Standard No.: 10.1007/978-3-031-18067-5doiSubjects--Topical Terms:
844473
Data encryption (Computer science)
--Congresses.
LC Class. No.: QA76.9.A25 / C77 2022
Dewey Class. No.: 005.82
Cyberspace safety and security = 14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022 : proceedings /
LDR
:03172nmm a2200373 a 4500
001
2303979
003
DE-He213
005
20220928085144.0
006
m d
007
cr nn 008maaau
008
230409s2022 sz s 0 eng d
020
$a
9783031180675
$q
(electronic bk.)
020
$a
9783031180668
$q
(paper)
024
7
$a
10.1007/978-3-031-18067-5
$2
doi
035
$a
978-3-031-18067-5
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
C77 2022
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.82
$2
23
090
$a
QA76.9.A25
$b
C958 2022
111
2
$a
CSS (Conference)
$n
(14th :
$d
2022 :
$c
Xi'an, Shaanxi Sheng, China)
$3
3605797
245
1 0
$a
Cyberspace safety and security
$h
[electronic resource] :
$b
14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022 : proceedings /
$c
edited by Xiaofeng Chen, Jian Shen, Willy Susilo.
246
3
$a
CSS 2022
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
xiii, 376 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
13547
505
0
$a
Cryptography and its applications -- Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead -- Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare -- Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q) -- A Collaborative Access Control Scheme based on Incentive Mechanism -- Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing -- Updatable Hybrid Encryption Scheme with No-directional Key Update for Cloud Storage -- Data security -- FDLedger: Dynamic and Efficient Anonymous Audit for Distributed Ledgers -- A Method of Traceless File Deletion for NTFS File System -- Efficient and Collusion Resistant Multi-Party Private Set Intersection Protocols for Large Participants and Small Sets Setting -- Attack and defense techniques -- High Quality Audio Adversarial Examples without Using Psychoacoustics -- Working Mechanism of Eternalblue and Its Application in Ransomworm -- Substitution Attacks against Sigma Protocols -- A Multi-stage APT Attack Detection Method based on Sample Enhancement -- VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer -- Network security and its applications -- Improvised Model for Blockchain in Distributed Cloud Environment -- Multi-hop Multi-key Homomorphic Encryption with Less Noise under CRS Model -- Design of Anti-machine Learning Malicious Node System based on Blockchain.
520
$a
This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace Safety and Security, CSS 2022, held in Xi'an, China, in October 2022.The 26 revised full papers presented were carefully reviewed and selected from 104 initial submissions. The papers focus on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.
650
0
$a
Data encryption (Computer science)
$v
Congresses.
$3
844473
650
0
$a
Computer security
$v
Congresses.
$3
622818
650
1 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Computing Milieux.
$3
893243
650
2 4
$a
Computer Imaging, Vision, Pattern Recognition and Graphics.
$3
890871
650
2 4
$a
Artificial Intelligence.
$3
769149
700
1
$a
Chen, Xiaofeng.
$3
1279321
700
1
$a
Shen, Jian.
$3
1680574
700
1
$a
Susilo, Willy.
$3
900132
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in computer science ;
$v
13547.
$3
3605798
856
4 0
$u
https://doi.org/10.1007/978-3-031-18067-5
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9445528
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 C77 2022
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login