Science of Cyber Security - SciSec 2022 Workshops -

Science of Cyber Security - SciSec 2022 Workshops

AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 10–12, 2022, Revised Selected Papers

Chunhua Su, Kouichi Sakurai (Herausgeber)

Buch | Softcover
227 Seiten
2023 | 1st ed. 2022
Springer Verlag, Singapore
978-981-19-7768-8 (ISBN)
80,24 inkl. MwSt
This volume constitutes the papers of several workshops which were held in conjunction with the 4th International Conference on Science of Cyber Security Workshops, SciSec 2022, held in Matsue, Japan, in August 10–12, 2022. The 15 revised full papers and 3 posters were presented in this book were carefully reviewed and selected from 30 submissions.They were organized in topical sections as follows: AI Crypto and Security Workshop (AI-CryptoSec); Theory and Application of Blockchain and NFT Workshop (TA-BC-NFT); and Mathematical Science of Quantum Safety and its Application Workshop (MathSci-Qsafe).

​AI Crypto and Security Workshop (AI-CryptoSec).- Image Data Recoverability against Data Collaboration and its Countermeasure.- Image Data Recoverability against Data Collaboration and its Countermeasure.- Human Security Behavior Assistance in the Cyber-physical Space.- A Privacy-preserving Electricity Theft Detection (PETD) Scheme for Smart Grid.- Design and implementation of VCP network for Open Flow.- Theory and Application of Blockchain and NFT Workshop (TA-BC-NFT).- Medical waste treatment process based on Blockchain technology - a case study of Covid-19 waste handling in Vietnam.- Blockchain technology-based management of blood and its products - a case study in Vietnam.- Application of the elimination competition mechanism based on blockchain multi-supervision in vehicle data sharing.- Economic Perspective of Cybersecurity: Principles and Strategies.-  Towards a Dynamic Reputation Management Scheme for Cross-chain Transactions.- Mathematical Science of Quantum Safety and its Application Workshop (MathSci-Qsafe).- Revisiting Security of Symmetric-Key Encryption with Imperfect Randomness and Correlation between Source and Keys.- A Secure Image-Video Retrieval Scheme with Attribute-Based Encryption and Multi-Feature Fusion in Smart Grid.- A Survey on Privacy Preserving Synthetic Data Generation and a Discussion on a Privacy-Utility Trade-off Problem.- Multi-Client Private Decision Tree Classification using Threshold Fully Homomorphic Encryption.- Advances in adversarial attacks and defenses in Intrusion Detection System: A survey.- Zero-touch Provisioned Device Lifecycle and Its Security in IoT.- Activation Code Delivery on V2X Pseudonym Certificate Revocation.- Federated Active Learning.

Erscheinungsdatum
Reihe/Serie Communications in Computer and Information Science ; 1680
Zusatzinfo 49 Illustrations, color; 22 Illustrations, black and white; X, 227 p. 71 illus., 49 illus. in color.
Verlagsort Singapore
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
ISBN-10 981-19-7768-2 / 9811977682
ISBN-13 978-981-19-7768-8 / 9789811977688
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95