Trusted computing and information se...
Chinese Conference on Trusted Computing and Information Security (2019 :)

FindBook      Google Book      Amazon      博客來     
  • Trusted computing and information security = 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019 : revised selected papers /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Trusted computing and information security/ edited by Weili Han, Liehuang Zhu, Fei Yan.
    其他題名: 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019 : revised selected papers /
    其他題名: CTCIS 2019
    其他作者: Han, Weili.
    團體作者: Chinese Conference on Trusted Computing and Information Security
    出版者: Singapore :Springer Singapore : : 2020.,
    面頁冊數: xii, 356 p. :ill. (some col.), digital ;24 cm.
    內容註: Generative image Steganography based on GANs -- Partial blind proxy re-signature scheme for mobile internet -- Information Flow-Based Security Construction for Compositional Interface Automata -- Provably secure server-assisted verification threshold proxy re-signature scheme -- ReJection: A AST-based Reentrancy Vulnerability Detection Method -- Identity authentication under Internet of everything based on edge computing -- STC: Improving the Performance of Virtual Machines Based on Task Classification -- A Method for Realizing Covert Communication at Router Driving Layer -- A secure multi-party signature scheme based on trust mechanism -- Virtual FPGA Placement with An Efficient Ant Colony Optimization -- Identity-based threshold group signature scheme of Blockchain verification -- ByteDroid: Android Malware Detection using Deep Learning on Bytecode Sequences -- Research on Multidimensional System Security Assessment Based on AHP and Gray Correlation -- Research on Software Network Key Nodes Mining Methods Based on Complex Network -- Research and development of TPM virtualization -- A Secure Certificateless Identity Authentication Scheme Based on Blockchain -- A trust-based security research method for Internet of things terminal -- A QoS&SLA-driven Multifaceted Trust Model for Cloud Computing -- A Lossless Data hiding Scheme in Public Key Encrypted Domain based on homomorphic Key-Switching -- A Detection Approach for Buffer Overflow Vulnerability based on Data Control Flow Graph -- Outsourced Data Integrity Auditing for Efficient Batch Dynamic Updates -- Secure Personal Health Records Sharing based on Blockchain and IPFS.
    Contained By: Springer eBooks
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-981-15-3418-8
    ISBN: 9789811534188
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9391008 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 C55 2019 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入