Muutke küpsiste eelistusi

E-raamat: Trusted Computing and Information Security: 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019, Revised Selected Papers

Edited by , Edited by , Edited by
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2019, held in Shanghai, China, in October 2019.

The 22 revised full papers presented were carefully reviewed and selected from 247 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, network security, information hiding. 

Generative image Steganography based on GANs.- Partial blind proxy
re-signature scheme for mobile internet.- Information Flow-Based Security
Construction for Compositional Interface Automata.- Provably secure
server-assisted verification threshold proxy re-signature scheme.- ReJection:
A AST-based Reentrancy Vulnerability Detection Method.- Identity
authentication under Internet of everything based on edge computing.- STC:
Improving the Performance of Virtual Machines Based on Task
Classification.- A Method for Realizing Covert Communication at Router
Driving Layer.- A secure multi-party signature scheme based on trust
mechanism.- Virtual FPGA Placement with An Efficient Ant Colony
Optimization.- Identity-based threshold group signature scheme of Blockchain
verification.- ByteDroid: Android Malware Detection using Deep Learning on
Bytecode Sequences.- Research on Multidimensional System Security Assessment
Based on AHP and Gray Correlation.- Research on Software Network Key Nodes
Mining Methods Based on Complex Network.- Research and development of TPM
virtualization.- A Secure Certificateless Identity Authentication Scheme
Based on Blockchain.- A trust-based security research method for Internet of
things terminal.- A QoS&SLA-driven Multifaceted Trust Model for Cloud
Computing.- A Lossless Data hiding Scheme in Public Key Encrypted Domain
based on homomorphic Key-Switching.- A Detection Approach for Buffer Overflow
Vulnerability based on Data Control Flow Graph.- Outsourced Data Integrity
Auditing for Ecient Batch Dynamic Updates.- Secure Personal Health Records
Sharing based on Blockchain and IPFS.