Update cookies preferences

E-book: Security and Privacy in New Computing Environments: Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings

Edited by , Edited by , Edited by
  • Format - EPUB+DRM
  • Price: 55,56 €*
  • * the price is final i.e. no additional discount will apply
  • Add to basket
  • Add to Wishlist
  • This ebook is for personal use only. E-Books are non-refundable.

DRM restrictions

  • Copying (copy/paste):

    not allowed

  • Printing:

    not allowed

  • Usage:

    Digital Rights Management (DRM)
    The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.  To read this e-book you have to create Adobe ID More info here. Ebook can be read and downloaded up to 6 devices (single user with the same Adobe ID).

    Required software
    To read this ebook on a mobile device (phone or tablet) you'll need to install this free app: PocketBook Reader (iOS / Android)

    To download and read this eBook on a PC or Mac you need Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)

    You can't read this ebook with Amazon Kindle

This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually.

The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.

Network Security.- A Characterisation of Smart Grid DoS Attacks.-
Security and Privacy in 5G Applications: Challenges and Solutions.- Alarm
Elements based Adaptive Network Security Situation Prediction Model.-
Watermark based Tor Cross-domain Tracking System For Tor Network Traceback.-
System Security.- Research on IoT Security Technology and Standardization in
the 5G Era.- MIMEC Based Information System Security Situation Assessment
Model.- IoTFC: A Secure and Privacy Preserving Architecture for Smart
Buildings.- A Secure Experimentation Sandbox for the design and execution of
trusted and secure analytics in the aviation domain.- Machine Learning.-
Research on a Hybrid EMD-SVR Model for Time Series Prediction.- Distant
Supervision for Relations Extraction via Deep Residual Learning and
Multi-Instance Attention in Cybersecurity.- User Identity Linkage across
Social Networks based on Neural Tensor Network.- An Efficient and
Privacy-Preserving Physiological Case Classification Scheme forE-healthcare
System.- A multi-class detection system for Android malicious Apps based on
color image features.- Authentication and Access Control.- PUF-based
Two-factor Group Authentication in Smart Home.- An Authentication Framework
in ICN-enabled Industrial Cyber-Physical Systems.- Access Control for
Wireless Body Area Networks.- FIDO - that dog wont hunt.- Blockchain-enabled
user authentication in zero trust Internet of Things.- Cloud Security.-
Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing
Scheme for Cloud Storage.- A Public Auditing Framework against Malicious
Auditors for Cloud Storage based on Blockchain.- A Secure and Verifiable
Outsourcing Scheme for Machine Learning Data.- Support Vector Machine
Intrusion Detection Scheme Based on Cloud-Fog Collaboration.- An
Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge
Computing.- Cryptography.- Generative image steganography based on digital
Cardan Grille.- Pixel Grouping Based Image Hashing for DIBR 3D Image.-
Improved Conditional Differential Analysis on NLFSR Based Block Cipher
KATAN32 with MILP.- Applied Cryptography.- A Verifiable Combinatorial Auction
Scheme with Bidders Privacy Protection.- A Multi-user Shared Searchable
Encryption Scheme Supporting SQL Query.- Forward Secure Searchable Encryption
with Conjunctive-Keyword Supporting Multi-User.- A3BAC: Attribute-Based
Access Control Model with Anonymous Access.- Blockchain-based Decentralized
Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid.