語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Emerging information security and ap...
~
Emerging Information Security and Applications (Symposium) (2022 :)
FindBook
Google Book
Amazon
博客來
Emerging information security and applications = third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Emerging information security and applications/ edited by Jiageng Chen, Debiao He, Rongxing Lu.
其他題名:
third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022 : proceedings /
其他題名:
EISA 2022
其他作者:
Chen, Jiageng.
團體作者:
Emerging Information Security and Applications (Symposium)
出版者:
Cham :Springer Nature Switzerland : : 2022.,
面頁冊數:
x, 225 p. :ill. (some col.), digital ;24 cm.
內容註:
Asymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography -- A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks -- Towards Low-Latency Big Data Infrastructure at Sangfor -- Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB -- Parallel Validity Analysis of the Boomerang Attack Model -- A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography -- Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis without q-type assumption -- AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels -- HBMD-FL:Heterogeneous Federated Learning Algorithm Based On Blockchain and Model Distillation -- Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET -- An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy -- D2CDIM:DID-based Decentralized Cross-domain Identity Management with Privacy-Preservation and Sybil-Resistance -- Link Aware Aggregation Query with Privacy-preserving Capability in Wireless Sensor Networks.
Contained By:
Springer Nature eBook
標題:
Data protection - Congresses. -
電子資源:
https://doi.org/10.1007/978-3-031-23098-1
ISBN:
9783031230981
Emerging information security and applications = third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022 : proceedings /
Emerging information security and applications
third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022 : proceedings /[electronic resource] :EISA 2022edited by Jiageng Chen, Debiao He, Rongxing Lu. - Cham :Springer Nature Switzerland :2022. - x, 225 p. :ill. (some col.), digital ;24 cm. - Communications in computer and information science,16411865-0937 ;. - Communications in computer and information science ;1641..
Asymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography -- A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks -- Towards Low-Latency Big Data Infrastructure at Sangfor -- Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB -- Parallel Validity Analysis of the Boomerang Attack Model -- A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography -- Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis without q-type assumption -- AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels -- HBMD-FL:Heterogeneous Federated Learning Algorithm Based On Blockchain and Model Distillation -- Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET -- An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy -- D2CDIM:DID-based Decentralized Cross-domain Identity Management with Privacy-Preservation and Sybil-Resistance -- Link Aware Aggregation Query with Privacy-preserving Capability in Wireless Sensor Networks.
This volume constitutes selected papers presented at the Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022. Due to COVID-19, EISA 2022 was held fully online. The 13 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice.
ISBN: 9783031230981
Standard No.: 10.1007/978-3-031-23098-1doiSubjects--Topical Terms:
678562
Data protection
--Congresses.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Emerging information security and applications = third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022 : proceedings /
LDR
:02886nmm a2200349 a 4500
001
2306798
003
DE-He213
005
20230103194056.0
006
m d
007
cr nn 008maaau
008
230421s2022 sz s 0 eng d
020
$a
9783031230981
$q
(electronic bk.)
020
$a
9783031230974
$q
(paper)
024
7
$a
10.1007/978-3-031-23098-1
$2
doi
035
$a
978-3-031-23098-1
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UK
$2
bicssc
072
7
$a
COM043000
$2
bisacsh
072
7
$a
UK
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
E53 2022
111
2
$a
Emerging Information Security and Applications (Symposium)
$n
(3rd :
$d
2022 :
$c
Online)
$3
3611363
245
1 0
$a
Emerging information security and applications
$h
[electronic resource] :
$b
third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022 : proceedings /
$c
edited by Jiageng Chen, Debiao He, Rongxing Lu.
246
3
$a
EISA 2022
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2022.
300
$a
x, 225 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0937 ;
$v
1641
505
0
$a
Asymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography -- A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks -- Towards Low-Latency Big Data Infrastructure at Sangfor -- Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB -- Parallel Validity Analysis of the Boomerang Attack Model -- A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography -- Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis without q-type assumption -- AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels -- HBMD-FL:Heterogeneous Federated Learning Algorithm Based On Blockchain and Model Distillation -- Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET -- An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy -- D2CDIM:DID-based Decentralized Cross-domain Identity Management with Privacy-Preservation and Sybil-Resistance -- Link Aware Aggregation Query with Privacy-preserving Capability in Wireless Sensor Networks.
520
$a
This volume constitutes selected papers presented at the Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022. Due to COVID-19, EISA 2022 was held fully online. The 13 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice.
650
0
$a
Data protection
$x
Congresses.
$3
678562
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
700
1
$a
Chen, Jiageng.
$3
3135375
700
1
$a
He, Debiao.
$3
3611364
700
1
$a
Lu, Rongxing.
$3
2194833
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Communications in computer and information science ;
$v
1641.
$3
3611365
856
4 0
$u
https://doi.org/10.1007/978-3-031-23098-1
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9447758
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入