Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Emerging Information Security and Applications -

Emerging Information Security and Applications

Third International Conference, EISA 2022, Wuhan, China, October 29–30, 2022, Proceedings
Buch | Softcover
X, 225 Seiten
2023 | 1st ed. 2022
Springer International Publishing (Verlag)
978-3-031-23097-4 (ISBN)
CHF 112,30 inkl. MwSt
  • Versand in 15-20 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken
This volume constitutes selected papers presented at the Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022.
This volume constitutes selected papers presented at the Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022. Due to COVID-19, EISA 2022 was held fully online.

The 13 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. 

Asymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.- A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks.- Towards Low-Latency Big Data Infrastructure at Sangfor.- Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB.- Parallel Validity Analysis of the Boomerang Attack Model.- A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography.- Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis without q-type assumption.- AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels.- HBMD-FL:Heterogeneous Federated Learning Algorithm Based On Blockchain and Model Distillation.- Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET.- An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy.- D2CDIM:DID-based Decentralized Cross-domain Identity Management with Privacy-Preservation and Sybil-Resistance.- Link Aware Aggregation Query with Privacy-preserving Capability in Wireless Sensor Networks.

Erscheinungsdatum
Reihe/Serie Communications in Computer and Information Science
Zusatzinfo X, 225 p. 69 illus., 51 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 364 g
Themenwelt Mathematik / Informatik Informatik Netzwerke
Informatik Weitere Themen Hardware
Schlagworte Access Control • Applications • Artificial Intelligence • Authentification • computer crime • Computer Science • Computer Security • conference proceedings • Cryptology • Data Mining • Data Security • Informatics • Network Protocols • privacy • Public Key Cryptography • Research
ISBN-10 3-031-23097-3 / 3031230973
ISBN-13 978-3-031-23097-4 / 9783031230974
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
entwickle, drucke und baue deine DIY-Objekte

von Stephan Regele

Buch | Hardcover (2023)
Hanser, Carl (Verlag)
CHF 48,95