Trusted computing and information se...
Chinese Conference on Trusted Computing and Information Security (2018 :)

FindBook      Google Book      Amazon      博客來     
  • Trusted computing and information security = 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018 : revised selected papers /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Trusted computing and information security/ edited by Huanguo Zhang, Bo Zhao, Fei Yan.
    其他題名: 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018 : revised selected papers /
    其他題名: CTCIS 2018
    其他作者: Zhang, Huanguo.
    團體作者: Chinese Conference on Trusted Computing and Information Security
    出版者: Singapore :Springer Singapore : : 2019.,
    面頁冊數: xii, 410 p. :ill. (some col.), digital ;24 cm.
    內容註: Ciphertext-Policy Attribute-Based Encryption for Circuits from Lattices under Weak Security Model -- Impossible Differential Cryptanalysis of SPECK -- Detect Peer-To-Peer Botnet with Permutation Entropy and Adaptive Information Fusion -- Research of Snort Rule Extension and APT Detection Based on APT Network Behavior Analysis -- Network Risk Assessment Method Based on Asset Correlation Graph -- Password Guessing Based on Semantic Analysis and Neural Networks -- An Approach of Implementing SW-TPM in Real-Time Operating System -- A Multilevel Trusted Clustering Mechanism for the Awareness Layer of the Internet of Things -- A Multi-Layer Virtual Network Isolation Detection Method for Cloud Platform -- A Behavioral Measurement Model Suitable for the Sensing Nodes of Internet of Things -- An Efficient and Revocable Decentralizing Attribute-Based Encryption for Mobile Cloud Computing -- A Voting Scheme in Blockchain Based on Threshold Group Signature -- HABKS: Hierarchical Attribute-Based Keyword Search on Outsourcing Data -- A Trusted Measurement Model for Mobile Internet -- A Fast Identity Authentication Solution for the Sensing Layer in Internet of Things -- Cryptanalysis of an ElGamal-like Cryptosystem Based on Matrices over Group Rings -- An Analysis About the Defects of Windows UAC Mechanism -- A Privacy Protection Scheme in VANETs Based on Group Signature -- Analysis of Wireless Sensor Networks Behavior for Trustworthiness Evaluation -- Digging Evidence for Violation of Cloud Security Compliance with Knowledge Learned from Logs -- Two Anti-Quantum Attack Protocols for Secure multiparty Computation -- A Cloud Storage Data Access Control Scheme Based on Attribute-Sets Encryption -- Detecting Malicious URLs Using a Deep Learning Approach Based on Stacked Denoising Autoencoder -- Predicting Vulnerable Software Components via Bellwethers.
    Contained By: Springer eBooks
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-981-13-5913-2
    ISBN: 9789811359132
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入