Security and Privacy in New Computing Environments -

Security and Privacy in New Computing Environments

Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings
Buch | Softcover
XIII, 462 Seiten
2021 | 1st ed. 2021
Springer International Publishing (Verlag)
978-3-030-66921-8 (ISBN)
106,99 inkl. MwSt
This book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually.

The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography.

Network Security.- A Characterisation of Smart Grid DoS Attacks.- Security and Privacy in 5G Applications: Challenges and Solutions.- Alarm Elements based Adaptive Network Security Situation Prediction Model.- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback.- System Security.- Research on IoT Security Technology and Standardization in the 5G Era.- MIMEC Based Information System Security Situation Assessment Model.- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings.- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain.- Machine Learning.- Research on a Hybrid EMD-SVR Model for Time Series Prediction.- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity.- User Identity Linkage across Social Networks based on Neural Tensor Network.- An Efficient and Privacy-Preserving Physiological Case Classification Scheme forE-healthcare System.- A multi-class detection system for Android malicious Apps based on color image features.- Authentication and Access Control.- PUF-based Two-factor Group Authentication in Smart Home.- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems.- Access Control for Wireless Body Area Networks.- FIDO - that dog won't hunt.- Blockchain-enabled user authentication in zero trust Internet of Things.- Cloud Security.- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage.- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain.- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data.- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration.- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing.- Cryptography.- Generative image steganography based on digital Cardan Grille.- Pixel Grouping Based Image Hashing for DIBR 3D Image.- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP.- Applied Cryptography.- A Verifiable Combinatorial Auction Scheme with Bidder's Privacy Protection.- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query.- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User.- A3BAC: Attribute-Based Access Control Model with Anonymous Access.- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid.

Erscheinungsdatum
Reihe/Serie Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Zusatzinfo XIII, 462 p. 122 illus., 108 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 724 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Schlagworte Applications • Artificial Intelligence • authentication • Cloud • Communication Systems • Computer Networks • Computer Science • Computer Security • Computer systems • conference proceedings • cryptography • Databases • Data Security • Engineering • Informatics • Internet of Things (IoT) • Network Protocols • Network Security • Research • Security and Privacy • Signal Processing • Smart Systems • Software Design • Telecommunication networks • wireless telecommunication systems
ISBN-10 3-030-66921-1 / 3030669211
ISBN-13 978-3-030-66921-8 / 9783030669218
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95