Security, Privacy, and Anonymity in Computation, Communication, and Storage

Security, Privacy, and Anonymity in Computation, Communication, and Storage

SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings

Atiquzzaman, Mohammed; Wang, Guojun; Choo, Kim-Kwang Raymond; Yan, Zheng

Springer International Publishing AG

12/2017

855

Mole

Inglês

9783319723945

15 a 20 dias

1312

Descrição não disponível.
The 9th IEEE International Symposium on UbiSafe Computing (UbiSafe 2017).- MTIV: A Trustworthiness Determination Approach for Threat Intelligence.- CoDistributed Caching Based Memory Optimizing Technology for Stream Data of IoV.- Secure Transfer Protocol Between App and Device of Internet of Things.- Rogue Access Points Detection Based on Theory of SemiSupervised Learning.- Phishing Detection Method Based on Borderline-Smote Deep Belief Network.- Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field.- Security Review and Study of DoS Attack on DNS in the International Roaming EPC_LTE Network.- A SYN Flood Detection Method Based on Self - similarity in Network Traffic.- Annotating Network Service Fault based on Temporal Interval Relations.- The 9th IEEE International Workshop on Security in e-Science and e-Research (ISSR 2017).- An Anonymous Identity-Based Authentication Scheme in Vector Network.- The 8th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2017).- Two Improved Anonymous Authentication Methods for PCS.- Multi-Match Segments Similarity Join Algorithm Based on MapReduce.- GPU-accelerated Histogram Generation on Smart-phone and Webbrowser.- An Efficient Message Routing Algorithm Using Overhearing in Community Opportunistic Networks.- A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping.- Game Theoretical Analysis on System Adoption and Acceptance: A Review.- A Novel Bivariate Entropy-based Network Anomaly Detection System.- The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance.- Neural Network based Web Log Analysis for Web Intrusion Detection.- The 7th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2017).- Code Abstractions for Automatic Information Flow Control in a Model-Driven Approach.- WaybackVisor: Hypervisor-based Scalable Live Forensic Architecture for Timeline Analysis.- Cloud Ownership and Reliability - Issues and Developments.- A Trust-based Service Self-Organizing Model for Cloud Market.- A Reliable Resource Scheduling for Network Function Virtualization.- On Global Resource Allocation in Clusters for Data Analytics.- An Automatic Generation Method for Condition Expressions of CPN Model Focus on Tested Behaviors.- The 6th International Symposium on Security and Privacy on Internet of Things (SPIoT 2017).- Analysing the Resilience of the Internet of Things against Physical and Proximity Attacks.- Ensuring IoT/M2M System Security under the Limitation of Constrained Gateways.- Spatial Reconfigurable Physical Unclonable Functions for the Internet of Things.- Localizing Wireless Jamming Attacks with Minimal Network Resources.- The 5th International Workshop on Network Optimization and Performance Evaluation (NOPE 2017).- An Architecture of Urban Regional Health Information System andIts Data Conversion Algorithm.- CCN Hotspot Cache Placement Strategy Based on Genetic Algorithm.- The Impact of Routing Protocols on the Performance of a Mobility Model in Mobile Ad Hoc Network (MANET).- A Comparative Study of Zynq-based OpenFlow Switches in a Software/Hardware Co-design.- Design and Implementation of a Low-cost Software De ned Wireless Network Testbed for Smart Home.- Energy-efficiency Aware Cooperative Caching Strategy for Content-centric Networks.- The 3rd International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2017). -Password Recovery for ZIP Files Based on ARM-FPGA Cluster.- Comparison of Different Centrality Measures to Find Influential Nodes in Complex Networks.- An FPGA-based Algorithm to Accelerate Regular Expression Matching.- A Collaborative Filtering Recommendation Algorithm Based on Score Classification.- FluteDB: An Efficient and Dependable Time-Series Database Storage Engine.- Attacks on the Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud.- Research on Coupling Reliability Problem in Sensor- Cloud System.- An On-demand Monitoring Approach for Cloud Computing Systems.- Security on "A Lightweight Authentication Scheme with User Untraceability".- A Security Scheme of Big Data Identity for Cloud Environment.- A Compact Construction for Non-monotonic Online/Offline CP-ABE scheme.- RPS-TSM: A Robot Perception System Based on Temporal Semantic Map.- MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data.- The Art of Using Cross-Layer Design in Cognitive Radio Networks.- A Quality Model for Evaluating Encryption-as-a-Service.- Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement.- A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration.- Security and Attack Vector Analysis of IoT Devices.- Security Solution of RFID Card through Cryptography.- Grouping Users for Quick Recommendations of Text Documents based on Deep Neural Network.- Module-level Software Streaming Loading Model Based on Hypervisor.- The 3rd International Symposium on Sensor-Cloud Systems (SCS 2017).- On-Street Car Parking Prediction in Smart City: A Multi-Source Data Analysis in Sensor-Cloud Environment.- A Weight-bind-based Safe Top-k Query Processing Scheme in Two-tiered Sensor Networks.- A Floorplanning Algorithm for Partially Reconfigurable FPGA in Wireless Sensor Network.- CO-TDMA: a TDMA Protocol for Collecting Data and OAP at the Same Time.- Cloud-assisted Data Storage and Query Processing at Vehicular Ad-hoc Sensor Networks.- EFAV-MERD: Expected Forwarding Area Volume and Residual Distance Mathematic Expectation Routing Protocol for UASNs.- The 2nd International Workshop on Cloud Storage Service and Computing (WCSSC 2017).- Fast Truss Decomposition in Memory.- Pyramid:Revisiting Memory Extension with Remote Accessible Non-Volatile Main Memory.- Fully Decentralized Multi-Authority ABE Scheme in Data Sharing System.- Malware Variants Detection Using Density Based Spatial Clustering with Global Opcode Matrix.- Research on Graph Processing Systems on a Single Machine.- 3D Model Reconstruction with Sequence Image of Aircraft.- Construction Research on Information Platform for Small and Medium-sized Enterprises Based on Cloud Storage Technology.- XoT: A Flexible Block I/O Data Transfer Protocol for Xen.- The First International Symposium on Multimedia Security and Digital Forensics (MSDF 2017).- Detecting Spliced Face using Texture Analysis.- Fine-grained, Multi-key Search Control in Multi-user Searchable Encryption.- Overview of Performance Evaluation of Keyword Search Utilities in Forensic/E-Discovery Software.- The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity (SPBD 2017).- Distribution Network Topology Reconstruction Method Based on Lasso and Its Supplementary Criterions.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
access control;authentication;cloud computing;computer crime;cryptography;data mining;data security;digital watermarking;electronic document identification systems;information hiding;internet;mobile computing;privacy;privacy preserving;public key cryptography;privacy protection;pub keys (PK);security systems;telecommunication networks;wireless telecommunication systems