Muutke küpsiste eelistusi

E-raamat: Frontiers in Cyber Security: 6th International Conference, FCS 2023, Chengdu, China, August 21-23, 2023, Revised Selected Papers

Edited by , Edited by
  • Formaat - EPUB+DRM
  • Hind: 110,53 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This volume constitutes the refereed proceedings of the 6th International Conference on Frontiers in Cyber Security, FCS 2023, held in Chengdu, China, in August 2023.

The 44 full papers included in this book were carefully reviewed and selected from 89 submissions. They were organized in topical sections as follows: Blockchain and Distributed Systems; Network Security and Privacy Protection; Cryptography and Encryption Techniques; Machine Learning and Security; and Internet of Things and System Security.

Blockchain and Distributed Systems.- Secure Cross-chain Transaction for
Medical Data Sharing in Blockchain-based Internet of Medical Things.- An
blockchain-based proxy re-encryption scheme with cryptographic reverse
firewall for IoV.- SCCT-DARS: Secure and Compliant Cryptocurrency
Transactions in a Decentralized Anonymous Regulated System.- ODSC: A Unique
Chameleon Hash-based Application Framework for Blockchain Smart
Contracts.- Cross-chain Identity Authentication for BIoMT with Multi-chain
Fusion Mode.- Blockchain-based signature scheme with cryptographic reverse
firewalls for IoV.- Network Security and Privacy Protection.- A Hierarchical
Asynchronous Federated Learning Privacy-Preserving Framework for IoVs.- A
Secure Mutual Authentication Scheme for Wireless Communication.- A Multi-tab
Webpage Fingerprinting Method Based on Multi-head Self-attention.- Improving
Accuracy of Interactive Queries in Personalized Differential
Privacy.- VPSearch+: Achieving Verifiability for Privacy-Preserving
Multi-Keyword Search without Client Storage Overhead.- Security-Enhanced
Function Privacy Attribute-Based Encryption.- Certificateless Ring
Signcryption Scheme with Conditional Privacy Protection in Smart
Grid.- Byzantine-robust Privacy-preserving Federated Learning based on
DT-PKC.- Updatable and Dynamic Searchable Symmetric Encryption Scheme with
Forward and Backward Privacy.- Efficient and Secure Count Queries on
Encrypted Genomic Data.- Automatic construction of knowledge graph for
personal sensitive data.- Cryptography and Encryption
Techniques.- Heterogeneous Aggregate Signature for Unmanned Aerial
Vehicles.- Secure arbitrated quantum signature scheme with Bell state.- An
Authorized Function Homomorphic Proxy Signature Scheme with Sampling Batch
Verification.- ASEV: Anonymous and Scored-Based E-Voting Protocol on
Blockchain.- A New Self-Dual-BKZ algorithm based on Lattice Sieving.- A
Certificateless Designated Verifier Sanitizable Signature.- An Inner Product
Function Encryption Scheme for Secure Distance Calculation.- Efficient
Non-Interactive Zero-Knowledge Proof for Graph 3-Coloring
Problem.- Cloud-Aided Scalable Revocable IBE with Ciphertext Update from
Lattices in the Random Oracle Model.- Heterogeneous Signcryption Scheme With
Equality Test for Internet of Vehicles.- An Improved Updatable Signature
Scheme with Weakened Token.- A pairing-based certificateless authenticated
searchable encryption with MTI guarantees.- Machine Learning and
Security.- Anomaly detection method for integrated encrypted malicious
traffic based on RFCNN-GRU.- TimeGAN: A Novel Solution to Imbalanced
Encrypted Traffic Datasets.- Secure Steganography Scheme based on
Steganography Generative Adversarial Network.- SR-GNN: Spectral Residuals
with Graph Neural Networks for Anomaly Detection in ADS-B Data.- Learned
Pseudo-Random Number Generator based on Generative Adversarial Networks.- An
Intrusion Detection System Using Vision Transformer for Representation
Learning.- PaBiL-Net: Parallel Bidirectional LSTM Network for Mobile
Encrypted Traffic Classification.- A General Source Code Vulnerability
Detection Method via Ensemble of Graph Neural Networks.- Federated
Long-Tailed Learning by Retraining the Biased Classifier with
Prototypes.- Internet of Things and System Security.- Ensuring SLA Compliance
of Edge Enabled Cloud Service for IoT application: A Dynamic QoS-aware
Scheme.- A Regenerating Code Based Data Restoration Scheme in Active RFID
System.- Lightweight Privacy-Preserving Medical Diagnostic Scheme for
Internet of Things Healthcare.- Windows Fuzzing Framework Based on Dynamic
Tracing And Process Cloning.- Meta-HFMD: A Hierarchical Feature Fusion
Malware Detection Framework via Multi-TaskMeta-Learning.- Privacy-Preserving
Cloud-Edge Collaborative K-Means Clustering Model in IoT.