Muutke küpsiste eelistusi

Security, Privacy, and Anonymity in Computation, Communication, and Storage: 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 1417, 2019, Proceedings 2019 ed. [Pehme köide]

Edited by , Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 506 pages, kõrgus x laius: 235x155 mm, kaal: 795 g, 142 Illustrations, color; 175 Illustrations, black and white; XVI, 506 p. 317 illus., 142 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 11611
  • Ilmumisaeg: 12-Jul-2019
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3030249069
  • ISBN-13: 9783030249069
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 506 pages, kõrgus x laius: 235x155 mm, kaal: 795 g, 142 Illustrations, color; 175 Illustrations, black and white; XVI, 506 p. 317 illus., 142 illus. in color., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 11611
  • Ilmumisaeg: 12-Jul-2019
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3030249069
  • ISBN-13: 9783030249069

This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2019, held in Atlanta, GA, USA in July 2019. The 37 full papers were carefully reviewed and selected from 109 submissions.

The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.

Distributed Privacy Preserving Platform for Ridesharing Services
1(14)
Yevhenii Semenko
Damien Saucez
Ransom ware Attack Protection: A Cryptographic Approach
15(11)
Anjali Kumari
Md Zakirul Alam Bhuiyan
Jigyasa Namdeo
Shipra Kanaujia
Ruhul Amin
Satyanarayana Vollala
A Lightweight Secure Communication Protocol for IoT Devices Using Physically Unclonable Function
26(10)
Priyanka Mall
Md Zakirul Alam Bhuiyan
Ruhul Amin
Blockchain-Based Mobility Management for LTE and Beyond
36(14)
Han Lee
Maode Ma
EPT: EDNS Privacy Tunnel for DNS
50(13)
Lanlan Pan
Jie Chen
Anlei Hu
Xuebiao Yuchi
Ensuring Data Integrity in Fog Computing Based Health-Care Systems
63(15)
Abdulwahab Alazeb
Brajendra Panda
Modelling Security Requirements for Software Development with Common Criteria
78(11)
Naseer Amara
Zhiqui Huang
Awais Ali
Visualization of DNS Tunneling Attacks Using Parallel Coordinates Technique
89(13)
Yasir F. Mohammed
Dale R. Thompson
A Data-Driven Network Intrusion Detection Model Based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection
102(15)
Lena Ara
Xiao Luo
Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning
117(16)
Tin Tze Chiang
Tan Saw Chin
Lee Ching Kwang
Y. Zulfadzli
K. Rizaludin
End-to-End Encryption Schemes for Online Social Networks
133(14)
Fabian Schillinger
Christian Schindelhauer
Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data
147(10)
Melodee Montgomery
Prosenjit Chatterjee
John Jenkins
Kaushik Roy
Paper Document Authentication Using Print-Scan Resistant Image Hashing and Public-Key Cryptography
157(9)
Fawad Ahmad
Lee-Ming Cheng
TLShps: SDN-Based TLS Handshake Protocol Simplification for IoT
166(17)
Lei Yan
Maode Ma
Yan Ma
Data Protection Labware for Mobile Security
183(13)
Hossain Shahriar
Md Arabin Talukder
Hongmei Chi
Mohammad Rahman
Sheikh Ahamed
Atef Shalan
Khaled Tarmissi
Multi-round Bidding Strategy Based on Game Theory for Crowdsensing Task
196(15)
En Wang
Yongjian Yang
Jie Wu
Hengzhi Wang
Information Leakage in Wearable Applications
211(14)
Babatunde Olabenjo
Dwight Makaroff
An Encryption-Based Approach to Protect Fog Federations from Rogue Nodes
225(19)
Mohammed Alshehri
Brajendra Panda
Python Scrapers for Scraping Cryptomarkets on Tor
244(17)
Yubao Wu
Fengpan Zhao
Xucan Chen
Pavel Skums
Eric L. Sevigny
David Maimon
Marie Ouellet
Monica Haavislo Swahn
Sheryl M. Strasser
Mohammad Javad Feizollahi
Youfang Zhang
Gunjan Sekhon
Characteristics of Bitcoin Transactions on Cryptomarkets
261(16)
Xucan Chen
Mohammad Al Hasan
Xintao Wu
Pavel Skums
Mohammad Javad Feizollahi
Marie Ouellet
Eric L. Sevigny
David Maimon
Yubao Wu
Effectiveness of Machine Learning Based Intrusion Detection Systems
277(12)
Mohammed Alrowaily
Freeh Alenezi
Zhuo Lu
DNS Flood Attack Mitigation Utilizing Hot-Lists and Stale Content Updates
289(8)
Tasnuva Mahjabin
Yang Xiao
Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking
297(12)
Cheng Chi Qin
Tan Saw Chin
Lee Ching Kwang
Zulfadzli Yusoff
Rizaluddin Kaspin
Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation Industry
309(16)
Ng Kean Haur
Tan Saw Chin
Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching
325(11)
Guosheng Xu
Zhimin Wu
Chengze Li
Jinghua Yan
Jing Yuan
Zhiyong Wang
Lu Wang
Using Machine Learning to Find Anomalies in Field Bus Network Traffic
336(18)
Martin Peters
Johannes Goltz
Simeon Wiedenmann
Thomas Mundt
Cyber Weapons Storage Mechanisms
354(14)
Muhammd Mudassar Yamin
Basel Katt
Mazaher Kianpour
A New Intrusion Detection System Based on Gated Recurrent Unit (GRU) and Genetic Algorithm
368(16)
Mahdi Manavi
Yunpeng Zhang
Topic Model Based Android Malware Detection
384(13)
Yucai Song
Yang Chen
Bo Lang
Hongyu Liu
Shaojie Chen
A Verifiable Encryption Scheme Supporting Fuzzy Search
397(15)
Ruwei Huang
Zhikun Li
Guang Wu
A Verifiable Fully Homomorphic Encryption Scheme
412(15)
Ruwei Huang
Zhikun Li
Jianan Zhao
Secure Communication in UAV Assisted HetNets: A Proposed Model
427(14)
Aabid Rashid
Diwankshi Sharma
Tufail A. Lone
Sumeet Gupta
Sachin Kumar Gupta
Detection of Application-Layer Tunnels with Rules and Machine Learning
441(15)
Huaqing Lin
Gao Liu
Zheng Yan
An Anonymous Protocol for Member Privacy in a Consortium Blockchain
456(9)
Gyeong-Jin Ra
Daehee Seo
Md Zakirul Alam Bhuiyan
Lm-Yeong Lee
Automated Construction of Malware Families
465(10)
Krishnendu Ghosh
Jeffery Mills
A Closer Look at Anonymous Proxy Re-Encryption Schemes
475(15)
S. Sharmila Deva Selvi
S. Harish
Swethashree Dhanabal
C. Pandu Rangan
Approximate String Matching for DNS Anomaly Detection
490(15)
Roni Mateless
Michael Segal
Author Index 505