FindBook      Google Book      Amazon      博客來     
  • Frontiers in cyber security = 6th International Conference, FCS 2023, Chengdu, China, August 21-23, 2023 : revised selected papers /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Frontiers in cyber security/ edited by Haomiao Yang, Rongxing Lu.
    其他題名: 6th International Conference, FCS 2023, Chengdu, China, August 21-23, 2023 : revised selected papers /
    其他題名: FCS 2023
    其他作者: Yang, Haomiao.
    團體作者: International Conference on Frontiers in Cyber Security
    出版者: Singapore :Springer Nature Singapore : : 2024.,
    面頁冊數: xv, 673 p. :ill. (chiefly col.), digital ;24 cm.
    內容註: Blockchain and Distributed Systems -- Secure Cross-chain Transaction for Medical Data Sharing in Blockchain-based Internet of Medical Things -- An blockchain-based proxy re-encryption scheme with cryptographic reverse firewall for IoV -- SCCT-DARS: Secure and Compliant Cryptocurrency Transactions in a Decentralized Anonymous Regulated System -- ODSC: A Unique Chameleon Hash-based Application Framework for Blockchain Smart Contracts -- Cross-chain Identity Authentication for BIoMT with Multi-chain Fusion Mode -- Blockchain-based signature scheme with cryptographic reverse firewalls for IoV -- Network Security and Privacy Protection -- A Hierarchical Asynchronous Federated Learning Privacy-Preserving Framework for IoVs -- A Secure Mutual Authentication Scheme for Wireless Communication -- A Multi-tab Webpage Fingerprinting Method Based on Multi-head Self-attention -- Improving Accuracy of Interactive Queries in Personalized Differential Privacy -- VPSearch+: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search without Client Storage Overhead -- Security-Enhanced Function Privacy Attribute-Based Encryption -- Certificateless Ring Signcryption Scheme with Conditional Privacy Protection in Smart Grid -- Byzantine-robust Privacy-preserving Federated Learning based on DT-PKC -- Updatable and Dynamic Searchable Symmetric Encryption Scheme with Forward and Backward Privacy -- Efficient and Secure Count Queries on Encrypted Genomic Data -- Automatic construction of knowledge graph for personal sensitive data -- Cryptography and Encryption Techniques -- Heterogeneous Aggregate Signature for Unmanned Aerial Vehicles -- Secure arbitrated quantum signature scheme with Bell state -- An Authorized Function Homomorphic Proxy Signature Scheme with Sampling Batch Verification -- ASEV: Anonymous and Scored-Based E-Voting Protocol on Blockchain -- A New Self-Dual-BKZ algorithm based on Lattice Sieving -- A Certificateless Designated Verifier Sanitizable Signature -- An Inner Product Function Encryption Scheme for Secure Distance Calculation -- Efficient Non-Interactive Zero-Knowledge Proof for Graph 3-Coloring Problem -- Cloud-Aided Scalable Revocable IBE with Ciphertext Update from Lattices in the Random Oracle Model -- Heterogeneous Signcryption Scheme With Equality Test for Internet of Vehicles -- An Improved Updatable Signature Scheme with Weakened Token -- A pairing-based certificateless authenticated searchable encryption with MTI guarantees -- Machine Learning and Security -- Anomaly detection method for integrated encrypted malicious traffic based on RFCNN-GRU -- TimeGAN: A Novel Solution to Imbalanced Encrypted Traffic Datasets -- Secure Steganography Scheme based on Steganography Generative Adversarial Network -- SR-GNN: Spectral Residuals with Graph Neural Networks for Anomaly Detection in ADS-B Data -- Learned Pseudo-Random Number Generator based on Generative Adversarial Networks -- An Intrusion Detection System Using Vision Transformer for Representation Learning -- PaBiL-Net: Parallel Bidirectional LSTM Network for Mobile Encrypted Traffic Classification -- A General Source Code Vulnerability Detection Method via Ensemble of Graph Neural Networks -- Federated Long-Tailed Learning by Retraining the Biased Classifier with Prototypes -- Internet of Things and System Security -- Ensuring SLA Compliance of Edge Enabled Cloud Service for IoT application: A Dynamic QoS-aware Scheme -- A Regenerating Code Based Data Restoration Scheme in Active RFID System -- Lightweight Privacy-Preserving Medical Diagnostic Scheme for Internet of Things Healthcare -- Windows Fuzzing Framework Based on Dynamic Tracing And Process Cloning -- Meta-HFMD: A Hierarchical Feature Fusion Malware Detection Framework via Multi-Task Meta-Learning -- Privacy-Preserving Cloud-Edge Collaborative K-Means Clustering Model in IoT.
    Contained By: Springer Nature eBook
    標題: Computer security - Congresses. -
    電子資源: https://doi.org/10.1007/978-981-99-9331-4
    ISBN: 9789819993314
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入