Security and Privacy in New Computing Environments
Springer International Publishing (Verlag)
978-3-030-66921-8 (ISBN)
The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.
Network Security.- A Characterisation of Smart Grid DoS Attacks.- Security and Privacy in 5G Applications: Challenges and Solutions.- Alarm Elements based Adaptive Network Security Situation Prediction Model.- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback.- System Security.- Research on IoT Security Technology and Standardization in the 5G Era.- MIMEC Based Information System Security Situation Assessment Model.- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings.- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain.- Machine Learning.- Research on a Hybrid EMD-SVR Model for Time Series Prediction.- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity.- User Identity Linkage across Social Networks based on Neural Tensor Network.- An Efficient and Privacy-Preserving Physiological Case Classification Scheme forE-healthcare System.- A multi-class detection system for Android malicious Apps based on color image features.- Authentication and Access Control.- PUF-based Two-factor Group Authentication in Smart Home.- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems.- Access Control for Wireless Body Area Networks.- FIDO - that dog won't hunt.- Blockchain-enabled user authentication in zero trust Internet of Things.- Cloud Security.- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage.- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain.- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data.- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration.- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing.- Cryptography.- Generative image steganography based on digital Cardan Grille.- Pixel Grouping Based Image Hashing for DIBR 3D Image.- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP.- Applied Cryptography.- A Verifiable Combinatorial Auction Scheme with Bidder's Privacy Protection.- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query.- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User.- A3BAC: Attribute-Based Access Control Model with Anonymous Access.- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid.
Erscheinungsdatum | 24.01.2021 |
---|---|
Reihe/Serie | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Zusatzinfo | XIII, 462 p. 122 illus., 108 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 724 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Technik ► Elektrotechnik / Energietechnik | |
Technik ► Nachrichtentechnik | |
Schlagworte | Applications • Artificial Intelligence • authentication • Cloud • Communication Systems • Computer Networks • Computer Science • Computer Security • Computer systems • conference proceedings • cryptography • Databases • Data Security • Engineering • Informatics • Internet of Things (IoT) • Network Protocols • Network Security • Research • Security and Privacy • Signal Processing • Smart Systems • Software Design • Telecommunication networks • wireless telecommunication systems |
ISBN-10 | 3-030-66921-1 / 3030669211 |
ISBN-13 | 978-3-030-66921-8 / 9783030669218 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich