Emerging Information Security and Applications
Springer International Publishing (Verlag)
978-3-031-23097-4 (ISBN)
This volume constitutes selected papers presented at the Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022. Due to COVID-19, EISA 2022 was held fully online.The 13 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice.
Asymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.- A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks.- Towards Low-Latency Big Data Infrastructure at Sangfor.- Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB.- Parallel Validity Analysis of the Boomerang Attack Model.- A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography.- Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis without q-type assumption.- AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels.- HBMD-FL:Heterogeneous Federated Learning Algorithm Based On Blockchain and Model Distillation.- Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET.- An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy.- D2CDIM:DID-based Decentralized Cross-domain Identity Management with Privacy-Preservation and Sybil-Resistance.- Link Aware Aggregation Query with Privacy-preserving Capability in Wireless Sensor Networks.
Erscheinungsdatum | 05.01.2023 |
---|---|
Reihe/Serie | Communications in Computer and Information Science |
Zusatzinfo | X, 225 p. 69 illus., 51 illus. in color. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 364 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
Informatik ► Weitere Themen ► Hardware | |
Schlagworte | Access Control • Applications • Artificial Intelligence • Authentification • computer crime • Computer Science • Computer Security • conference proceedings • Cryptology • Data Mining • Data Security • Informatics • Network Protocols • privacy • Public Key Cryptography • Research |
ISBN-10 | 3-031-23097-3 / 3031230973 |
ISBN-13 | 978-3-031-23097-4 / 9783031230974 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich