Muutke küpsiste eelistusi

Security and Privacy in New Computing Environments: Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings 1st ed. 2021 [Pehme köide]

Edited by , Edited by , Edited by
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually.

The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.

Network Security.- A Characterisation of Smart Grid DoS Attacks.-
Security and Privacy in 5G Applications: Challenges and Solutions.- Alarm
Elements based Adaptive Network Security Situation Prediction Model.-
Watermark based Tor Cross-domain Tracking System For Tor Network Traceback.-
System Security.- Research on IoT Security Technology and Standardization in
the 5G Era.- MIMEC Based Information System Security Situation Assessment
Model.- IoTFC: A Secure and Privacy Preserving Architecture for Smart
Buildings.- A Secure Experimentation Sandbox for the design and execution of
trusted and secure analytics in the aviation domain.- Machine Learning.-
Research on a Hybrid EMD-SVR Model for Time Series Prediction.- Distant
Supervision for Relations Extraction via Deep Residual Learning and
Multi-Instance Attention in Cybersecurity.- User Identity Linkage across
Social Networks based on Neural Tensor Network.- An Efficient and
Privacy-Preserving Physiological Case Classification Scheme forE-healthcare
System.- A multi-class detection system for Android malicious Apps based on
color image features.- Authentication and Access Control.- PUF-based
Two-factor Group Authentication in Smart Home.- An Authentication Framework
in ICN-enabled Industrial Cyber-Physical Systems.- Access Control for
Wireless Body Area Networks.- FIDO - that dog wont hunt.- Blockchain-enabled
user authentication in zero trust Internet of Things.- Cloud Security.-
Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing
Scheme for Cloud Storage.- A Public Auditing Framework against Malicious
Auditors for Cloud Storage based on Blockchain.- A Secure and Verifiable
Outsourcing Scheme for Machine Learning Data.- Support Vector Machine
Intrusion Detection Scheme Based on Cloud-Fog Collaboration.- An
Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge
Computing.- Cryptography.- Generative image steganography based on digital
Cardan Grille.- Pixel Grouping Based Image Hashing for DIBR 3D Image.-
Improved Conditional Differential Analysis on NLFSR Based Block Cipher
KATAN32 with MILP.- Applied Cryptography.- A Verifiable Combinatorial Auction
Scheme with Bidders Privacy Protection.- A Multi-user Shared Searchable
Encryption Scheme Supporting SQL Query.- Forward Secure Searchable Encryption
with Conjunctive-Keyword Supporting Multi-User.- A3BAC: Attribute-Based
Access Control Model with Anonymous Access.- Blockchain-based Decentralized
Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid.