| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996495564103316 |
|
|
Titolo |
Applied cryptography in computer and communications : Second EAI International Conference, AC3 2022, virtual event, May 14-15, 2022, proceedings / / edited by Jingqiang Lin, Qiang Tang |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham, Switzerland : , : Springer, , [2022] |
|
©2022 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (229 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; ; v.448 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Intro -- Preface -- Organization -- Contents -- Quantum-Safe Cryptographic Solution -- DU-QS22: A Dataset for Analyzing QC-MDPC-Based Quantum-Safe Cryptosystems -- 1 Introduction -- 2 QC-MDPC-Based Cryptosystem -- 3 Importance of Decoder -- 4 Overview of Our Implementation -- 4.1 Key-Generation Module -- 4.2 Encryption Module -- 4.3 Decryption Modules -- 5 DU-QS22 Dataset -- 6 Conclusion -- References -- Quantum-Safe Signing of Notification Messages in Intelligent Transport Systems -- 1 Introduction -- 2 Previous Work -- 3 Test Program -- 3.1 Implementing the Digital Signature Algorithms -- 3.2 Performance Tests -- 4 Results -- 5 Discussion -- 6 Future Research -- 7 Summary -- References -- Applied Cryptography for IoT -- WB-GWS: An IoT-Oriented Lightweight Gateway System Based on White-Box Cryptography -- 1 Introduction -- 2 Preliminaries -- 3 The Construction of WB-GWS -- 3.1 The Framework of WB-GWS -- 3.2 The Protocols of WB-GWS -- 4 Gateway Addition -- 5 Gateway Removal -- 6 Security Analysis -- 7 Experiment -- 7.1 The Experiment Base on Temperature and Humidity Sensor System -- 7.2 The Performance Comparison -- 8 Conclusions -- References -- Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 System Setup |
|
|
|
|
|
|
|
|
|
Phase -- 3.2 Registration Phase -- 3.3 Authentication and Session Key Negotiation Phase -- 4 Comparative Analysis and Evaluation -- 4.1 Security Evaluation -- 4.2 Performance Evaluation -- 5 Conclusion and Future Work -- References -- Resource Consumption Evaluation of C++ Cryptographic Libraries on Resource-Constrained Devices -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Evaluation -- 4.1 Selected Algorithms -- 4.2 Experimental Setup -- 4.3 Discussion of Results -- 4.4 Limitations. |
5 Conclusions and Future Work -- References -- Authentication Protocol -- A Secure Lightweight RFID Mutual Authentication Protocol Without Explicit Challenge-Response Pairs -- 1 Introduction -- 1.1 Structure of the Paper -- 2 Preliminaries -- 3 The Proposed Protocol -- 3.1 Notations -- 3.2 Assumptions of Our Proposed Protocol -- 3.3 Authentication Process -- 4 BAN Logic Analysis and Simulation Using the Scyther -- 4.1 BAN Logical Analysis -- 4.2 Simulation Using the Scyther -- 5 Security Analysis -- 6 Performance Evaluation -- 7 Conclusion -- A Analysis of the Gope et al.'s Scheme -- A.1 Performance and Security Analysis of Gope's Scheme -- B Physical Unclonable Functions -- C Feldman's (t,n)-threshold Verifiable Secret Sharing Scheme -- D Basic Notations and Logical Postulates of BAN Logical -- D.1 Basic Notations -- D.2 Logical Postulates -- E Security Simulation Using Scyther -- References -- bisAUTH: A Blockchain-Inspired Secure Authentication Protocol for IoT Nodes -- 1 Introduction -- 2 Related Works -- 3 bisAUTH: A New Blockchain-Inspired Secure Authentication Protocol for IoT Nodes -- 3.1 Main Components of the bisAUTH Protocol -- 3.2 Main Phases of the bisAUTH Protocol -- 3.3 bisAUTH Protocol Assessment -- 4 Conclusion -- References -- Real-World Applied Cryptography -- X-FTPC: A Fine-Grained Trust Propagation Control Scheme for Cross-Certification Utilizing Certificate Transparency -- 1 Introduction -- 2 Background and Challenges -- 2.1 Cross-Certification -- 2.2 Trust Propagation Challenge -- 2.3 Certificate Transparency -- 3 X-FTPC: Fine-Grained Trust Propagation Control for Cross-Certification -- 3.1 Overview -- 3.2 Fine-Grained Control Based on Mandatory-Log in X-FTPC -- 3.3 Different Scenarios in X-FTPC -- 3.4 Potential Threats in X-FTPC -- 4 Discussion in Feasibility of X-FTPC -- 5 Related Work -- 6 Conclusion -- References. |
The Block-Based Mobile PDE Systems are Not Secure - Experimental Attacks -- 1 Introduction -- 2 Background -- 2.1 Flash Memory -- 2.2 Flash Translation Layer -- 2.3 Plausibly Deniable Encryption -- 3 Model and Assumptions -- 4 Experimentally Attacking the Block-Layer PDE Systems -- 4.1 Experimental Setup -- 4.2 Experimental Attacks -- 5 Discussion -- 6 Related Work -- 6.1 The Hidden Volume-Based PDE Systems -- 6.2 The Steganographic File Systems -- 7 Conclusion -- References -- Black-Box Testing of Cryptographic Algorithms Based on Data Characteristics -- 1 Introduction -- 2 Preliminaries -- 3 Design and Implementation -- 3.1 Overview -- 3.2 Characteristic Data Extraction and Data Set Construction -- 3.3 Characteristic Data Matching Strategy -- 3.4 Cryptographic Algorithm Determination -- 4 Evaluation -- 4.1 Experiments Setup -- 4.2 Effectiveness -- 4.3 Performance -- 4.4 Limitations -- 5 Summary -- A Cryptographic Algorithm Supports -- B Test File Information -- References -- Network Attack and Defense -- IoT Devices Classification Base on Network Behavior Analysis -- 1 Introduction -- 2 Related Work -- 3 Network Behavior Analysis Based IoT Devices Classification -- 3.1 Motivation an Analysis -- 3.2 Overview -- 3.3 Session Feature Extraction -- 3.4 Session Feature Preprocess -- 3.5 LSTM Based Sequence Feature Extraction -- 3.6 Multilayer Perceptron Classifier -- 4 Evaluation -- 4.1 IoT Testbed Construction and Traffic Collection -- |
|
|
|
|
|
|
|
|
4.2 Experimental Settings -- 4.3 Experimental Result and Analysis -- 4.4 Summary -- 5 Conclusion -- References -- Semi-supervised False Data Injection Attacks Detection in Smart Grid -- 1 Introduction -- 2 False Data Injection Attacks -- 3 Method -- 3.1 Overview -- 3.2 Samples Dataset Construction -- 3.3 Baseline Classifier Construction -- 3.4 Label Propagation and Semi-Supervised Classifier -- 4 Results -- 4.1 Dataset. |
4.2 Experimental Results -- 5 Discussion -- 5.1 Amount of Unlabeled Samples -- 5.2 Robustness of Parameters -- 5.3 Computational Complexity -- 5.4 Amount of Labeled Samples -- 6 Conclusion -- References -- Security Application -- A Novel Logistics Scheme Based on Zero-Trust Model -- 1 Introduction -- 2 Background -- 3 Scheme -- 3.1 Overall Process -- 3.2 Module -- 4 Experiment -- 4.1 Experimental Environment -- 4.2 System Test -- 4.3 Blockchain Test -- 4.4 Security Test -- 5 Analysis -- 5.1 Performance -- 5.2 Security -- 6 Conclusion -- References -- ALFLAT: Chinese NER Using ALBERT, Flat-Lattice Transformer, Word Segmentation and Entity Dictionary -- 1 Introduction -- 2 Background -- 3 Model -- 3.1 Converting Lattice into Flat Structure -- 3.2 Relative Position Encoding of Spans -- 3.3 Chinese Word Segmentation -- 3.4 Modify the Emission Matrix Scores -- 3.5 Conditional Random Fields -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Overall Performance -- 4.3 How ALFLAT Use ALBERT Instead of BERT -- 4.4 How ALFLAT Brings Improvement -- 5 Conclusion -- References -- Author Index. |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910826473403321 |
|
|
Autore |
Lors Christine |
|
|
Titolo |
Interactions materials - microorganisms : concretes and metals more resistant to biodeterioration / / Christine Lors, Francoise Feugeas, Bernard Tribollet |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Les Ulis, France : , : EDP Sciences, , [2018] |
|
©2018 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (390 pages) : illustrations |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Frontmatter -- Table of contents -- Preface -- List of authors -- Acknowledgements -- Theme 1 Physico-chemistry of surfaces -- Chapitre 1: Introduction to the physical chemistry of surfaces -- Chapitre 2: Construction materials: general description and physical chemistry -- Chapitre 3: Microorganism-Concrete Interactions -- Theme 2 Biofilms: actors of biodeterioration -- Chapitre 4: The bacterial cell: the functional unit of biofilms -- Chapitre 5: Biofilm lifestyle of the microscopic inhabitants of surfaces. -- Chapitre 6: Journey to the centre of biofilms : nature, cohesiveness and functions of the exopolymer matrix -- Chapitre 7: Biofilms in a marine environment : example of intertidal mud flats and metallic port structures -- Chapitre 8: Biofilms and management of microbial quality in drinking water supply systems -- Chapitre 9: Biofilms in industrial cooling circuits -- Theme 3 Biocorrosion of metallic materials -- Chapitre 10: Electrochemical methods applied to biocorrosion -- Chapitre 11: On the iron-sulphur interactions involved in biocorrosion phenomena -- Theme 4 Biodeterioration of non-metallic materials -- Chapitre 12: Biodeterioration of cementitious materials : interactions environment - microorganisms - materials -- Chapitre 13: Concrete biodeterioration -- Chapitre 14: Biodeterioration of cementitious materials in sewage structures -- Chapitre 15: Biodeterioration of cultural properties -- Theme 5 Design and modification of materials -- |
|
|
|
|
|
|
|
|
|
|
|
Chapitre 16: Choosing metallic materials with respect to microbial induced corrosion -- Chapitre 17: Antimicrobial surfaces : A tool to combat biofilm development -- Chapitre 18: Extracellular microbial substances for cementitious materials |
|
|
|
|
|
|
Sommario/riassunto |
|
This multidisciplinary book is the result of a collective work synthesizing presentations made by various specialists during the CNRS «BIODEMAT» school, which took place in October 2014 in La Rochelle (France). It is designed for readers of a range of scientific specialties (chemistry, biology, physics, etc.) and examines various industrial problems (e.g., water, sewerage and maintaining building materials). Metallic, cementitious, polymeric and composite materials age depending on their service and operational environments. In such cases, the presence of microorganisms can lead to biodeterioration. However, microorganisms can also help protect structures, provided their immense possibilities are mastered and put to good use. This book is divided into five themes related to biocolonization, material biodeterioration, and potential improvements to such materials resulting in better performance levels with respect to biodeterioration: • physical chemistry of surfaces; • biofilm implication in biodeterioration; • biocorrosion of metallic materials; • biodeterioration of non-metallic materials; • design and modification of materials. The affiliations of the authors of the various chapters illustrate the synergy between academic research and its transfer to industry. This demonstrates the essential interaction between the various actors in this complex field: analysing, understanding, and responding to the scientific issues related to biodeterioration. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910888048603321 |
|
|
Titolo |
Detection and Treatment of Emerging Contaminants in Wastewater / Sartaj Ahmad Bhat, Vineet Kumar, Fusheng Li, Pradeep Verma |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
United Kingdom : , : IWA Publishing, , 2024 |
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Soggetti |
|
Technology & Engineering / Mining |
Science / Applied Sciences |
Science / Environmental Science |
Science |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Sommario/riassunto |
|
Detection and Treatment of Emerging Contaminants in Wastewater addresses the critical and pressing need for effective strategies to detect and treat emerging contaminants, thereby mitigating risks associated with their presence in wastewater. This comprehensive book features contributions from prominent experts in the field of wastewater, providing an up-to-date and in-depth collection of chapters dedicated to tackling this pressing issue. Highlights: · The book serves as an invaluable resource for identifying, assessing, and comprehensively addressing emerging contaminants in wastewater and/or sludges. It delves into the assessment, mitigation, and treatment of various contaminants, including microplastics, antibiotic-resistant genes, pharmaceuticals, personal care products and industrial chemicals. · An exploration of the behavior of microplastics in different wastewater treatment plants and their accumulation in sludge, shedding light on their potential impact on the environment. · An introduction to the key mechanisms for the removal of emerging pollutants from sludge through fungal-mediated processes, offering innovative solutions for effective treatment. · An investigation into the fate and behavior of pharmaceutically-active compounds in wastewater, |
|
|
|
|
|
|
|
|
|
|
along with their potential environmental impacts. Additionally, accurate quantification procedures for these compounds are discussed. · The book covers new trends in the development of greener nanomaterials, evaluating their performance for abating emerging contaminants from wastewater. With its comprehensive insights and diverse perspectives, this book is an essential guide for researchers, professionals, and policymakers engaged in wastewater management and environmental protection. The practical solutions and scientific knowledge presented herein will contribute significantly to safeguarding our water resources and ensuring a cleaner and healthier future. |
|
|
|
|
|
| |