Cyberspace Safety and Security
Springer International Publishing (Verlag)
978-3-031-18066-8 (ISBN)
Cryptography and its applications.- Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead.- Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare.- Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q) .- A Collaborative Access Control Scheme based on Incentive Mechanism.- Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing.- Updatable Hybrid Encryption Scheme with No-directional Key Update for Cloud Storage.- Data security.- FDLedger: Dynamic and Efficient Anonymous Audit for Distributed Ledgers.- A Method of Traceless File Deletion for NTFS File System.- Efficient and Collusion Resistant Multi-Party Private Set Intersection Protocols for Large Participants and Small Sets Setting.- Attack and defense techniques.- High Quality Audio Adversarial Examples without Using Psychoacoustics.- Working Mechanism of Eternalblue and Its Application in Ransomworm.- Substitution Attacks against Sigma Protocols.- A Multi-stage APT Attack Detection Method based on Sample Enhancement.- VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer.- Network security and its applications.- Improvised Model for Blockchain in Distributed Cloud Environment.- Multi-hop Multi-key Homomorphic Encryption with Less Noise under CRS Model.- Design of Anti-machine Learning Malicious Node System based on Blockchain.
Erscheinungsdatum | 30.09.2022 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XIII, 376 p. 97 illus., 65 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 599 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Access Control • Applications • Artificial Intelligence • computer crime • Computer Science • conference proceedings • cryptography • Data communication systems • data privacy • Data Security • Encryption • Informatics • Network Protocols • Network Security • Public Key Cryptography • Research |
ISBN-10 | 3-031-18066-6 / 3031180666 |
ISBN-13 | 978-3-031-18066-8 / 9783031180668 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich