Muutke küpsiste eelistusi

E-raamat: Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings

Edited by , Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017. The 28 revised full papers presented were carefully reviewed and selected from 96 submissions.

This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017.

The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers focus on topics such as theory of trusted computing, trustworthy software; infrastructure of trusted computing, application and evaluation of trusted computing; network security and communication security; theory and technology of cryptographic techniques; information content security; system security for mobile network and IoT systems, industrial control and embedded systems; security for Cloud computing, virtualization systems and big data.

Homology Analysis Method of Worms Based on Attack and Propagation Features
1(15)
Liyan Wang
Jingfeng Xue
Yan Cui
Yong Wang
Chun Shan
Modeling and Analysis of Information Propagation Model of Online/Offline Network Based on Coupled Network
16(10)
Wanting Qin
Tongrang Fan
I A Signature-Sharing Based Auditing Scheme with Data Deduplication in Cloud Storage
26(15)
Liang Wang
Baocang Wang
Shuquan Ma
A Trusted VM Live Migration Protocol in IaaS
41(12)
Xinfeng He
Junfeng Tian
Double-Layered Predictor for High-Fidelity Reversible Data Hiding
53(13)
Fuqiang Di
Junyi Duan
Jia Liu
Guangwei Su
Yingnan Zhang
A New FPGA PUF Based on Transition Probability Delay Measurement
66(10)
Zhenyu Guan
Yuyao Qin
Junming Liu
A New Service Selection Method Based on Service Depository Relevance
76(11)
WeiJin Jiang
YuHui Xu
Real-Time Trusted Computing Technology for Xenomai
87(10)
Mingdi Xu
Xueyuan Gao
Yang Gao
Fan Zhang
Cryptanalysis of Rijndael-192/224 in Single Key Setting
97(15)
Mingyi Cui
Jiansheng Guo
Yipeng Liu
Exception Detection of Data Stream Based on Improved Maximal Frequent Itemsets Mining
112(14)
Saihua Cai
Ruizhi Sun
Chunming Cheng
Gang Wu
A Dictionary Sequence Model to Analyze the Security of Protocol Implementations at the Source Code Level
126(17)
Fu-Sheng Wu
Huan-Guo Zhang
The Analysis of Malicious Group Based on Suspicious Communication Behavior Aggregation
143(22)
Guolin Shao
Xingshu Chen
Xuemei Zeng
Xueyuan Yin
Xiaoming Ye
Yonggang Luo
Analysis of Vulnerability Correlation Based on Data Fitting
165(16)
Long Wang
Rui Ma
HaoRan Gao
XiaJing Wang
ChangZhen Hu
Tracking the Mobile Jammer in Wireless Sensor Network by Using Meanshift Based Method
181(17)
Liang Pang
Pengze Guo
Zhi Xue
Xiao Chen
New Upper Bounds on Degrees of Freedom for G-MIMO Relay Channel
198(15)
Xiao Chen
Liang Pang
Pengze Guo
Xingping Sun
Zhi Xue
Formalizing and Verifying GP TEE TA Interface Specification Using Coq
213(14)
Xia Yang
Zheng Yang
Haiyong Sun
Jingyu Liu
Research on Malicious Code Analysis Method Based on Semi-supervised Learning
227(15)
Tingting He
Jingfeng Xue
Jianwen Fu
Yong Wang
Chun Shan
Reliable Topology Control Algorithm in Cognitive Radio Networks
242(13)
Yali Zeng
Li Xu
Xiaoding Wang
Xu Yang
Practical Privacy-Preserving Outsourcing of Large-Scale Matrix Determinant Computation in the Cloud
255(20)
Guangzhi Zhang
Shaobin Cai
Chunhua Ma
Dongqiu Zhang
Universal Secure Error-Correcting (SEC) Schemes for Network Coding via McEliece Cryptosystem Based on QC-LDPC Codes
275(15)
Guangzhi Zhang
Shaobin Cai
Chunhua Ma
Dongqiu Zhang
A Research of Power Analysis Based on Multiple Classification Models
290(13)
Biao Liu
Yang Pan
Jiali Li
Huamin Feng
Classification of Video-Based Public Opinion via Projection Metric Learning with Riemannian Triplet Constraint
303(15)
Junfeng Tian
Yan Ha
A Trusted Routing Mechanism Suitable for the Sensing Nodes in Internet of Things
318(30)
Yubo Wang
Bei Gong
Yichen Wang
An Efficient ID-Based Mutual Authentication and Key Agreement Protocol for Mobile Multi-server Environment Without a Trusted Registration Center and ESL Attack
348(22)
Wei Li
Xue-lian Li
Jun-tao Gao
Hai-yu Wang
Research on Cryptographic Algorithm Recognition Based on Behavior Analysis
370(13)
Fei Yan
Yunlong Xing
Shiwei Zhang
Zhihan Yue
Yamin Zheng
A Struts2 Unknown Vulnerability Attack Detection and Backtracking Scheme Based on Multilayer Monitoring
383(14)
Anqi Hu
Guojun Peng
Zhenhang Chen
Zejin Zhu
An Approach of Implementing Core Role Based Access Control Model Using Attribute Based Encryption
397(12)
Yong Wang
Xuemin Pong
Ming Li
Jingfeng Xue
Ji Zhang
Zhenyan Liu
Dan Hao
Ning Wang
Author Index 409