語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security and privacy in social netwo...
~
SocialSec (Conference) (2022 :)
FindBook
Google Book
Amazon
博客來
Security and privacy in social networks and big data = 8th international symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022 : proceedings /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Security and privacy in social networks and big data/ edited by Xiaofeng Chen, Xinyi Huang, Miroslaw Kutylowski.
其他題名:
8th international symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022 : proceedings /
其他題名:
SocialSec 2022
其他作者:
Chen, Xiaofeng.
團體作者:
SocialSec (Conference)
出版者:
Singapore :Springer Nature Singapore : : 2022.,
面頁冊數:
xiii, 366 p. :ill. (chiefly color), digital ;24 cm.
內容註:
Cryptography and its applications -- Improved (t,n)-Threshold Proxy Signature Scheme -- Algorithm Substitution Attacks on Identity-Based Encryption -- Authenticated Continuous Top-k Spatial Keyword Search on Dynamic Objects -- Efficient Attribute-based Proxy Re-encryption for Secure Deduplication -- A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryption -- D2D Authentication Scheme for IoT-enabled Smart Home -- Inner Product Encryption from Middle-Product Learning with Errors -- Network security and privacy protection -- Publicly Verifiable Private Set Intersection from Homomorphic Encryption -- Secure Asynchronous Federated Learning for Edge Computing Devices -- FedBC: An Efficient and Privacy-preserving Federated Consensus Scheme -- A Secure and Privacy-preserving Authentication Scheme in IoMT -- Secure and Efficient k-Nearest Neighbor Query with Privacy-Preserving Authentication -- A Network Security Situation Assessment Method Based on Multi-attention Mechanism and HHO-ResNeXt -- A Privacy-Preserving Federated Learning with Mutual Verification on Vector Spaces -- Data detection -- Patch-based Backdoors Detection and Mitigation with Feature Masking -- Detection and Defense Against DDoS Attack on SDN Controller Based on Feature Selection -- Commodity-Tra: A Traceable Transaction Scheme Based on FISCO BCOS -- A Defect Heterogeneous Risk Assessment Method with Misclassification Cost -- Squeeze-Loss: A Utility-Free Defense Against Membership Inference Attacks -- Blockchain and its applications -- Improved WAVE Signature and Apply to Post-Quantum Blockchain -- Secure Government Data Sharing Based on Blockchain and Attribute-Based Encryption -- Secure Data Storage Scheme of Judicial System based on Blockchain -- Judicial Evidence Storage Scheme Based on Smart Contract.
Contained By:
Springer Nature eBook
標題:
Online social networks - Congresses. - Security measures -
電子資源:
https://doi.org/10.1007/978-981-19-7242-3
ISBN:
9789811972423
Security and privacy in social networks and big data = 8th international symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022 : proceedings /
Security and privacy in social networks and big data
8th international symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022 : proceedings /[electronic resource] :SocialSec 2022edited by Xiaofeng Chen, Xinyi Huang, Miroslaw Kutylowski. - Singapore :Springer Nature Singapore :2022. - xiii, 366 p. :ill. (chiefly color), digital ;24 cm. - Communications in computer and information science,16631865-0937 ;. - Communications in computer and information science ;1663..
Cryptography and its applications -- Improved (t,n)-Threshold Proxy Signature Scheme -- Algorithm Substitution Attacks on Identity-Based Encryption -- Authenticated Continuous Top-k Spatial Keyword Search on Dynamic Objects -- Efficient Attribute-based Proxy Re-encryption for Secure Deduplication -- A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryption -- D2D Authentication Scheme for IoT-enabled Smart Home -- Inner Product Encryption from Middle-Product Learning with Errors -- Network security and privacy protection -- Publicly Verifiable Private Set Intersection from Homomorphic Encryption -- Secure Asynchronous Federated Learning for Edge Computing Devices -- FedBC: An Efficient and Privacy-preserving Federated Consensus Scheme -- A Secure and Privacy-preserving Authentication Scheme in IoMT -- Secure and Efficient k-Nearest Neighbor Query with Privacy-Preserving Authentication -- A Network Security Situation Assessment Method Based on Multi-attention Mechanism and HHO-ResNeXt -- A Privacy-Preserving Federated Learning with Mutual Verification on Vector Spaces -- Data detection -- Patch-based Backdoors Detection and Mitigation with Feature Masking -- Detection and Defense Against DDoS Attack on SDN Controller Based on Feature Selection -- Commodity-Tra: A Traceable Transaction Scheme Based on FISCO BCOS -- A Defect Heterogeneous Risk Assessment Method with Misclassification Cost -- Squeeze-Loss: A Utility-Free Defense Against Membership Inference Attacks -- Blockchain and its applications -- Improved WAVE Signature and Apply to Post-Quantum Blockchain -- Secure Government Data Sharing Based on Blockchain and Attribute-Based Encryption -- Secure Data Storage Scheme of Judicial System based on Blockchain -- Judicial Evidence Storage Scheme Based on Smart Contract.
This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022. The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of advancement of the field's foundations. They were organized in topical sections as follows: Cryptography and its applications; Network security and privacy protection; Data detection; Blockchain and its applications.
ISBN: 9789811972423
Standard No.: 10.1007/978-981-19-7242-3doiSubjects--Topical Terms:
3453479
Online social networks
--Security measures--Congresses.
LC Class. No.: TK5105.8855 / .S63 2022
Dewey Class. No.: 025.042
Security and privacy in social networks and big data = 8th international symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022 : proceedings /
LDR
:03735nmm a2200349 a 4500
001
2304676
003
DE-He213
005
20221026144133.0
006
m d
007
cr nn 008maaau
008
230409s2022 si s 0 eng d
020
$a
9789811972423
$q
(electronic bk.)
020
$a
9789811972416
$q
(paper)
024
7
$a
10.1007/978-981-19-7242-3
$2
doi
035
$a
978-981-19-7242-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.8855
$b
.S63 2022
072
7
$a
UTN
$2
bicssc
072
7
$a
COM043050
$2
bisacsh
072
7
$a
UTN
$2
thema
082
0 4
$a
025.042
$2
23
090
$a
TK5105.8855
$b
.S678 2022
111
2
$a
SocialSec (Conference)
$n
(8th :
$d
2022 :
$c
Xi'an, China)
$3
3607086
245
1 0
$a
Security and privacy in social networks and big data
$h
[electronic resource] :
$b
8th international symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022 : proceedings /
$c
edited by Xiaofeng Chen, Xinyi Huang, Miroslaw Kutylowski.
246
3
$a
SocialSec 2022
260
$a
Singapore :
$b
Springer Nature Singapore :
$b
Imprint: Springer,
$c
2022.
300
$a
xiii, 366 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
490
1
$a
Communications in computer and information science,
$x
1865-0937 ;
$v
1663
505
0
$a
Cryptography and its applications -- Improved (t,n)-Threshold Proxy Signature Scheme -- Algorithm Substitution Attacks on Identity-Based Encryption -- Authenticated Continuous Top-k Spatial Keyword Search on Dynamic Objects -- Efficient Attribute-based Proxy Re-encryption for Secure Deduplication -- A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryption -- D2D Authentication Scheme for IoT-enabled Smart Home -- Inner Product Encryption from Middle-Product Learning with Errors -- Network security and privacy protection -- Publicly Verifiable Private Set Intersection from Homomorphic Encryption -- Secure Asynchronous Federated Learning for Edge Computing Devices -- FedBC: An Efficient and Privacy-preserving Federated Consensus Scheme -- A Secure and Privacy-preserving Authentication Scheme in IoMT -- Secure and Efficient k-Nearest Neighbor Query with Privacy-Preserving Authentication -- A Network Security Situation Assessment Method Based on Multi-attention Mechanism and HHO-ResNeXt -- A Privacy-Preserving Federated Learning with Mutual Verification on Vector Spaces -- Data detection -- Patch-based Backdoors Detection and Mitigation with Feature Masking -- Detection and Defense Against DDoS Attack on SDN Controller Based on Feature Selection -- Commodity-Tra: A Traceable Transaction Scheme Based on FISCO BCOS -- A Defect Heterogeneous Risk Assessment Method with Misclassification Cost -- Squeeze-Loss: A Utility-Free Defense Against Membership Inference Attacks -- Blockchain and its applications -- Improved WAVE Signature and Apply to Post-Quantum Blockchain -- Secure Government Data Sharing Based on Blockchain and Attribute-Based Encryption -- Secure Data Storage Scheme of Judicial System based on Blockchain -- Judicial Evidence Storage Scheme Based on Smart Contract.
520
$a
This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022. The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of advancement of the field's foundations. They were organized in topical sections as follows: Cryptography and its applications; Network security and privacy protection; Data detection; Blockchain and its applications.
650
0
$a
Online social networks
$x
Security measures
$v
Congresses.
$3
3453479
650
0
$a
Data encryption (Computer science)
$v
Congresses.
$3
844473
650
0
$a
Big data
$x
Security measures
$v
Congresses.
$3
3381760
650
0
$a
Privacy, Right of
$x
Congresses.
$3
678563
650
1 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
650
2 4
$a
Software Engineering.
$3
890874
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Computer Communication Networks.
$3
775497
700
1
$a
Chen, Xiaofeng.
$3
1279321
700
1
$a
Huang, Xinyi.
$3
2062602
700
1
$a
Kutylowski, Miroslaw.
$3
901030
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Communications in computer and information science ;
$v
1663.
$3
3607087
856
4 0
$u
https://doi.org/10.1007/978-981-19-7242-3
950
$a
Computer Science (SpringerNature-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9446225
電子資源
11.線上閱覽_V
電子書
EB TK5105.8855 .S63 2022
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入