Trusted Computing and Information Security
Springer Verlag, Singapore
978-981-13-5912-5 (ISBN)
The 24 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, and network security.
Ciphertext-Policy Attribute-Based Encryption for Circuits from Lattices under Weak Security Model.- Impossible Differential Cryptanalysis of SPECK.- Detect Peer-To-Peer Botnet with Permutation Entropy and Adaptive Information Fusion.- Research of Snort Rule Extension and APT Detection Based on APT Network Behavior Analysis.- Network Risk Assessment Method Based on Asset Correlation Graph.- Password Guessing Based on Semantic Analysis and Neural Networks.- An Approach of Implementing SW-TPM in Real-Time Operating System.- A Multilevel Trusted Clustering Mechanism for the Awareness Layer of the Internet of Things.- A Multi-Layer Virtual Network Isolation Detection Method for Cloud Platform.- A Behavioral Measurement Model Suitable for the Sensing Nodes of Internet of Things.- An Efficient and Revocable Decentralizing Attribute-Based Encryption for Mobile Cloud Computing.- A Voting Scheme in Blockchain Based on Threshold Group Signature.- HABKS: Hierarchical Attribute-Based Keyword Search on Outsourcing Data.- A Trusted Measurement Model for Mobile Internet.- A Fast Identity Authentication Solution for the Sensing Layer in Internet of Things.- Cryptanalysis of an ElGamal-like Cryptosystem Based on Matrices over Group Rings.- An Analysis About the Defects of Windows UAC Mechanism.- A Privacy Protection Scheme in VANETs Based on Group Signature.- Analysis of Wireless Sensor Networks Behavior for Trustworthiness Evaluation.- Digging Evidence for Violation of Cloud Security Compliance with Knowledge Learned from Logs.- Two Anti-Quantum Attack Protocols for Secure multiparty Computation.- A Cloud Storage Data Access Control Scheme Based on Attribute-Sets Encryption.- Detecting Malicious URLs Using a Deep Learning Approach Based on Stacked Denoising Autoencoder.- Predicting Vulnerable Software Components via Bellwethers.
Erscheinungsdatum | 11.01.2019 |
---|---|
Reihe/Serie | Communications in Computer and Information Science ; 960 |
Zusatzinfo | 60 Illustrations, color; 85 Illustrations, black and white; XII, 410 p. 145 illus., 60 illus. in color. |
Verlagsort | Singapore |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Mathematik / Informatik ► Informatik ► Datenbanken |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | Applications • Computer Science • conference proceedings • Informatics • Research |
ISBN-10 | 981-13-5912-1 / 9811359121 |
ISBN-13 | 978-981-13-5912-5 / 9789811359125 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich