Security and Privacy in New Computing Environments [E-Book] : 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings / edited by Wenbo Shi, Xiaofeng Chen, Kim-Kwang Raymond Choo.
This book constitutes the refereed proceedings of the 4thInternational Conference on Security and Privacy in New Computing Environments, SPNCE 2021, held in December 2021. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers were selected from 61 submissions and focus on se...
Saved in:
Full text |
|
Personal Name(s): | Chen, Xiaofeng, editor |
Choo, Kim-Kwang Raymond, editor / Shi, Wenbo, editor | |
Edition: |
1st edition 2022. |
Imprint: |
Cham :
Springer,
2022
|
Physical Description: |
XIII, 396 pages 134 illustrations, 86 illustrations in color (online resource) |
Note: |
englisch |
ISBN: |
9783030967918 |
DOI: |
10.1007/978-3-030-96791-8 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;
423 |
Subject (LOC): |
- Blockchain-based Outsourcing Shared Car Risk Prediction Scheme Design
- Fairness Protection Method of Vickery Auction Based on Smart Contract
- An Improved Needham-Schroeder Session Key Distribution Protocol For In-Vehicle CAN Network
- Research on Two-Party Cooperative Aigis-sig Digital Signature Protocol
- An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection
- A Lightweight PSIS Scheme Based on Multi-Node Collaboration in the IoT
- SAD: Website Fingerprint Defense based on Adversarial Examples
- A privacy-aware and time-limited data access control scheme with large universe and public traceability for Cloud-based IoD
- Multi-Party High-Dimensional Related Data Publishing via Probabilistic Principal Component Analysis and Differential Privacy
- ource code vulnerability detection method with multidimensional representation
- A Security Enhanced Verification Framework Based on Device Fingerprint in Internet of Things
- RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient
- Linear Policy Recommender Scheme for Large-Scale Attribute-based Access Control
- Non-interactive Privacy-preserving Naive Bayes Classifier Using Homomorphic Encryption
- BA-Audit: blockchain-based public auditing for aggregated data sharing in edge-assisted IoT
- Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System
- Threat Detection-Oriented Network Security Situation Assessment Method
- System Business Affecting Impact Analysis Method with Crossover Probability Theory
- RAP: A Lightweight Application Layer Defense against Website Fingerprinting
- FL-iotDP: Differential Private Federated Neural Network
- Analysis of Vulnerability of IPsec Protocol Implementation Based on Differential Fuzzing
- Honeywords Generation Method Based on Deep Learning and Rule-based Password Attack
- Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning
- GLV/GLS Scalar Multiplication on Twisted Edwards Curves
- Online Privacy of Personal Information - Perceptions v Reality
- ARTPHIL: Reversible de-identification of free-text using an integrated model Bayan
- CAFM: Precise Classication for Android Family Malware.