Security and Privacy in New Computing Environments (eBook, PDF)
Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings
Redaktion: Wang, Ding; Han, Jinguang; Meng, Weizhi
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Security and Privacy in New Computing Environments (eBook, PDF)
Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings
Redaktion: Wang, Ding; Han, Jinguang; Meng, Weizhi
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually.
The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 32.69MB
Andere Kunden interessierten sich auch für
- Security and Privacy in Communication Networks (eBook, PDF)73,95 €
- Advances in Artificial Intelligence and Security (eBook, PDF)97,95 €
- Information Systems Security and Privacy (eBook, PDF)61,95 €
- Security and Privacy in Communication Networks (eBook, PDF)40,95 €
- Cyberspace Safety and Security (eBook, PDF)53,95 €
- Machine Learning for Cyber Security (eBook, PDF)89,95 €
- Security and Privacy (eBook, PDF)53,95 €
-
-
-
This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually.
The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 462
- Erscheinungstermin: 21. Januar 2021
- Englisch
- ISBN-13: 9783030669225
- Artikelnr.: 62299357
- Verlag: Springer International Publishing
- Seitenzahl: 462
- Erscheinungstermin: 21. Januar 2021
- Englisch
- ISBN-13: 9783030669225
- Artikelnr.: 62299357
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Network Security.- A Characterisation of Smart Grid DoS Attacks.- Security and Privacy in 5G Applications: Challenges and Solutions.- Alarm Elements based Adaptive Network Security Situation Prediction Model.- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback.- System Security.- Research on IoT Security Technology and Standardization in the 5G Era.- MIMEC Based Information System Security Situation Assessment Model.- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings.- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain.- Machine Learning.- Research on a Hybrid EMD-SVR Model for Time Series Prediction.- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity.- User Identity Linkage across Social Networks based on Neural Tensor Network.- An Efficient and Privacy-Preserving Physiological Case Classification Scheme forE-healthcare System.- A multi-class detection system for Android malicious Apps based on color image features.- Authentication and Access Control.- PUF-based Two-factor Group Authentication in Smart Home.- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems.- Access Control for Wireless Body Area Networks.- FIDO - that dog won't hunt.- Blockchain-enabled user authentication in zero trust Internet of Things.- Cloud Security.- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage.- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain.- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data.- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration.- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing.- Cryptography.- Generative image steganography based on digital Cardan Grille.- Pixel Grouping Based Image Hashing for DIBR 3D Image.- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP.- Applied Cryptography.- A Verifiable Combinatorial Auction Scheme with Bidder's Privacy Protection.- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query.- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User.- A3BAC: Attribute-Based Access Control Model with Anonymous Access.- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid.
Network Security.- A Characterisation of Smart Grid DoS Attacks.- Security and Privacy in 5G Applications: Challenges and Solutions.- Alarm Elements based Adaptive Network Security Situation Prediction Model.- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback.- System Security.- Research on IoT Security Technology and Standardization in the 5G Era.- MIMEC Based Information System Security Situation Assessment Model.- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings.- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain.- Machine Learning.- Research on a Hybrid EMD-SVR Model for Time Series Prediction.- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity.- User Identity Linkage across Social Networks based on Neural Tensor Network.- An Efficient and Privacy-Preserving Physiological Case Classification Scheme forE-healthcare System.- A multi-class detection system for Android malicious Apps based on color image features.- Authentication and Access Control.- PUF-based Two-factor Group Authentication in Smart Home.- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems.- Access Control for Wireless Body Area Networks.- FIDO - that dog won't hunt.- Blockchain-enabled user authentication in zero trust Internet of Things.- Cloud Security.- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage.- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain.- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data.- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration.- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing.- Cryptography.- Generative image steganography based on digital Cardan Grille.- Pixel Grouping Based Image Hashing for DIBR 3D Image.- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP.- Applied Cryptography.- A Verifiable Combinatorial Auction Scheme with Bidder's Privacy Protection.- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query.- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User.- A3BAC: Attribute-Based Access Control Model with Anonymous Access.- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid.