1.

Record Nr.

UNISA996495564103316

Titolo

Applied cryptography in computer and communications : Second EAI International Conference, AC3 2022, virtual event, May 14-15, 2022, proceedings / / edited by Jingqiang Lin, Qiang Tang

Pubbl/distr/stampa

Cham, Switzerland : , : Springer, , [2022]

©2022

ISBN

3-031-17081-4

Descrizione fisica

1 online resource (229 pages)

Collana

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; ; v.448

Disciplina

929.605

Soggetti

Computer security

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Intro -- Preface -- Organization -- Contents -- Quantum-Safe Cryptographic Solution -- DU-QS22: A Dataset for Analyzing QC-MDPC-Based Quantum-Safe Cryptosystems -- 1 Introduction -- 2 QC-MDPC-Based Cryptosystem -- 3 Importance of Decoder -- 4 Overview of Our Implementation -- 4.1 Key-Generation Module -- 4.2 Encryption Module -- 4.3 Decryption Modules -- 5 DU-QS22 Dataset -- 6 Conclusion -- References -- Quantum-Safe Signing of Notification Messages in Intelligent Transport Systems -- 1 Introduction -- 2 Previous Work -- 3 Test Program -- 3.1 Implementing the Digital Signature Algorithms -- 3.2 Performance Tests -- 4 Results -- 5 Discussion -- 6 Future Research -- 7 Summary -- References -- Applied Cryptography for IoT -- WB-GWS: An IoT-Oriented Lightweight Gateway System Based on White-Box Cryptography -- 1 Introduction -- 2 Preliminaries -- 3 The Construction of WB-GWS -- 3.1 The Framework of WB-GWS -- 3.2 The Protocols of WB-GWS -- 4 Gateway Addition -- 5 Gateway Removal -- 6 Security Analysis -- 7 Experiment -- 7.1 The Experiment Base on Temperature and Humidity Sensor System -- 7.2 The Performance Comparison -- 8 Conclusions -- References -- Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 System Setup



Phase -- 3.2 Registration Phase -- 3.3 Authentication and Session Key Negotiation Phase -- 4 Comparative Analysis and Evaluation -- 4.1 Security Evaluation -- 4.2 Performance Evaluation -- 5 Conclusion and Future Work -- References -- Resource Consumption Evaluation of C++ Cryptographic Libraries on Resource-Constrained Devices -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Evaluation -- 4.1 Selected Algorithms -- 4.2 Experimental Setup -- 4.3 Discussion of Results -- 4.4 Limitations.

5 Conclusions and Future Work -- References -- Authentication Protocol -- A Secure Lightweight RFID Mutual Authentication Protocol Without Explicit Challenge-Response Pairs -- 1 Introduction -- 1.1 Structure of the Paper -- 2 Preliminaries -- 3 The Proposed Protocol -- 3.1 Notations -- 3.2 Assumptions of Our Proposed Protocol -- 3.3 Authentication Process -- 4 BAN Logic Analysis and Simulation Using the Scyther -- 4.1 BAN Logical Analysis -- 4.2 Simulation Using the Scyther -- 5 Security Analysis -- 6 Performance Evaluation -- 7 Conclusion -- A  Analysis of the Gope et al.'s Scheme -- A.1  Performance and Security Analysis of Gope's Scheme -- B  Physical Unclonable Functions -- C Feldman's (t,n)-threshold Verifiable Secret Sharing Scheme -- D Basic Notations and Logical Postulates of BAN Logical -- D.1 Basic Notations -- D.2 Logical Postulates -- E  Security Simulation Using Scyther -- References -- bisAUTH: A Blockchain-Inspired Secure Authentication Protocol for IoT Nodes -- 1 Introduction -- 2 Related Works -- 3 bisAUTH: A New Blockchain-Inspired Secure Authentication Protocol for IoT Nodes -- 3.1 Main Components of the bisAUTH Protocol -- 3.2 Main Phases of the bisAUTH Protocol -- 3.3 bisAUTH Protocol Assessment -- 4 Conclusion -- References -- Real-World Applied Cryptography -- X-FTPC: A Fine-Grained Trust Propagation Control Scheme for Cross-Certification Utilizing Certificate Transparency -- 1 Introduction -- 2 Background and Challenges -- 2.1 Cross-Certification -- 2.2 Trust Propagation Challenge -- 2.3 Certificate Transparency -- 3 X-FTPC: Fine-Grained Trust Propagation Control for Cross-Certification -- 3.1 Overview -- 3.2 Fine-Grained Control Based on Mandatory-Log in X-FTPC -- 3.3 Different Scenarios in X-FTPC -- 3.4 Potential Threats in X-FTPC -- 4 Discussion in Feasibility of X-FTPC -- 5 Related Work -- 6 Conclusion -- References.

The Block-Based Mobile PDE Systems are Not Secure - Experimental Attacks -- 1 Introduction -- 2 Background -- 2.1 Flash Memory -- 2.2 Flash Translation Layer -- 2.3 Plausibly Deniable Encryption -- 3 Model and Assumptions -- 4 Experimentally Attacking the Block-Layer PDE Systems -- 4.1 Experimental Setup -- 4.2 Experimental Attacks -- 5 Discussion -- 6 Related Work -- 6.1 The Hidden Volume-Based PDE Systems -- 6.2 The Steganographic File Systems -- 7 Conclusion -- References -- Black-Box Testing of Cryptographic Algorithms Based on Data Characteristics -- 1 Introduction -- 2 Preliminaries -- 3 Design and Implementation -- 3.1 Overview -- 3.2 Characteristic Data Extraction and Data Set Construction -- 3.3 Characteristic Data Matching Strategy -- 3.4 Cryptographic Algorithm Determination -- 4 Evaluation -- 4.1 Experiments Setup -- 4.2 Effectiveness -- 4.3 Performance -- 4.4 Limitations -- 5 Summary -- A Cryptographic Algorithm Supports -- B Test File Information -- References -- Network Attack and Defense -- IoT Devices Classification Base on Network Behavior Analysis -- 1 Introduction -- 2 Related Work -- 3 Network Behavior Analysis Based IoT Devices Classification -- 3.1 Motivation an Analysis -- 3.2 Overview -- 3.3 Session Feature Extraction -- 3.4 Session Feature Preprocess -- 3.5 LSTM Based Sequence Feature Extraction -- 3.6 Multilayer Perceptron Classifier -- 4 Evaluation -- 4.1 IoT Testbed Construction and Traffic Collection --



4.2 Experimental Settings -- 4.3 Experimental Result and Analysis -- 4.4 Summary -- 5 Conclusion -- References -- Semi-supervised False Data Injection Attacks Detection in Smart Grid -- 1 Introduction -- 2 False Data Injection Attacks -- 3 Method -- 3.1 Overview -- 3.2 Samples Dataset Construction -- 3.3 Baseline Classifier Construction -- 3.4 Label Propagation and Semi-Supervised Classifier -- 4 Results -- 4.1 Dataset.

4.2 Experimental Results -- 5 Discussion -- 5.1 Amount of Unlabeled Samples -- 5.2 Robustness of Parameters -- 5.3 Computational Complexity -- 5.4 Amount of Labeled Samples -- 6 Conclusion -- References -- Security Application -- A Novel Logistics Scheme Based on Zero-Trust Model -- 1 Introduction -- 2 Background -- 3 Scheme -- 3.1 Overall Process -- 3.2 Module -- 4 Experiment -- 4.1 Experimental Environment -- 4.2 System Test -- 4.3 Blockchain Test -- 4.4 Security Test -- 5 Analysis -- 5.1 Performance -- 5.2 Security -- 6 Conclusion -- References -- ALFLAT: Chinese NER Using ALBERT, Flat-Lattice Transformer, Word Segmentation and Entity Dictionary -- 1 Introduction -- 2 Background -- 3 Model -- 3.1 Converting Lattice into Flat Structure -- 3.2 Relative Position Encoding of Spans -- 3.3 Chinese Word Segmentation -- 3.4 Modify the Emission Matrix Scores -- 3.5 Conditional Random Fields -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Overall Performance -- 4.3 How ALFLAT Use ALBERT Instead of BERT -- 4.4 How ALFLAT Brings Improvement -- 5 Conclusion -- References -- Author Index.



2.

Record Nr.

UNINA9910826473403321

Autore

Lors Christine

Titolo

Interactions materials - microorganisms : concretes and metals more resistant to biodeterioration / / Christine Lors, Francoise Feugeas, Bernard Tribollet

Pubbl/distr/stampa

Les Ulis, France : , : EDP Sciences, , [2018]

©2018

ISBN

2-7598-2317-2

Descrizione fisica

1 online resource (390 pages) : illustrations

Collana

Science des Matériaux

Disciplina

541.39

Soggetti

Mechanical chemistry

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Frontmatter -- Table of contents -- Preface -- List of authors -- Acknowledgements -- Theme 1 Physico-chemistry of surfaces -- Chapitre 1: Introduction to the physical chemistry of surfaces -- Chapitre 2: Construction materials: general description and physical chemistry -- Chapitre 3: Microorganism-Concrete Interactions -- Theme 2 Biofilms: actors of biodeterioration -- Chapitre 4: The bacterial cell: the functional unit of biofilms -- Chapitre 5: Biofilm lifestyle of the microscopic inhabitants of surfaces. -- Chapitre 6: Journey to the centre of biofilms : nature, cohesiveness and functions of the exopolymer matrix -- Chapitre 7: Biofilms in a marine environment : example of intertidal mud flats and metallic port structures -- Chapitre 8: Biofilms and management of microbial quality in drinking water supply systems -- Chapitre 9: Biofilms in industrial cooling circuits -- Theme 3 Biocorrosion of metallic materials -- Chapitre 10: Electrochemical methods applied to biocorrosion -- Chapitre 11: On the iron-sulphur interactions involved in biocorrosion phenomena -- Theme 4 Biodeterioration of non-metallic materials -- Chapitre 12: Biodeterioration of cementitious materials : interactions environment - microorganisms - materials -- Chapitre 13: Concrete biodeterioration -- Chapitre 14: Biodeterioration of cementitious materials in sewage structures -- Chapitre 15: Biodeterioration of cultural properties -- Theme 5 Design and modification of materials --



Chapitre 16: Choosing metallic materials with respect to microbial induced corrosion -- Chapitre 17: Antimicrobial surfaces : A tool to combat biofilm development -- Chapitre 18: Extracellular microbial substances for cementitious materials

Sommario/riassunto

This multidisciplinary book is the result of a collective work synthesizing presentations made by various specialists during the CNRS «BIODEMAT» school, which took place in October 2014 in La Rochelle (France). It is designed for readers of a range of scientific specialties (chemistry, biology, physics, etc.) and examines various industrial problems (e.g., water, sewerage and maintaining building materials). Metallic, cementitious, polymeric and composite materials age depending on their service and operational environments. In such cases, the presence of microorganisms can lead to biodeterioration. However, microorganisms can also help protect structures, provided their immense possibilities are mastered and put to good use. This book is divided into five themes related to biocolonization, material biodeterioration, and potential improvements to such materials resulting in better performance levels with respect to biodeterioration: • physical chemistry of surfaces; • biofilm implication in biodeterioration; • biocorrosion of metallic materials; • biodeterioration of non-metallic materials; • design and modification of materials. The affiliations of the authors of the various chapters illustrate the synergy between academic research and its transfer to industry. This demonstrates the essential interaction between the various actors in this complex field: analysing, understanding, and responding to the scientific issues related to biodeterioration.



3.

Record Nr.

UNINA9910888048603321

Titolo

Detection and Treatment of Emerging Contaminants in Wastewater / Sartaj Ahmad Bhat, Vineet Kumar, Fusheng Li, Pradeep Verma

Pubbl/distr/stampa

United Kingdom : , : IWA Publishing, , 2024

Descrizione fisica

1 online resource

Soggetti

Technology & Engineering / Mining

Science / Applied Sciences

Science / Environmental Science

Science

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Sommario/riassunto

Detection and Treatment of Emerging Contaminants in Wastewater addresses the critical and pressing need for effective strategies to detect and treat emerging contaminants, thereby mitigating risks associated with their presence in wastewater. This comprehensive book features contributions from prominent experts in the field of wastewater, providing an up-to-date and in-depth collection of chapters dedicated to tackling this pressing issue. Highlights: · The book serves as an invaluable resource for identifying, assessing, and comprehensively addressing emerging contaminants in wastewater and/or sludges. It delves into the assessment, mitigation, and treatment of various contaminants, including microplastics, antibiotic-resistant genes, pharmaceuticals, personal care products and industrial chemicals. · An exploration of the behavior of microplastics in different wastewater treatment plants and their accumulation in sludge, shedding light on their potential impact on the environment. · An introduction to the key mechanisms for the removal of emerging pollutants from sludge through fungal-mediated processes, offering innovative solutions for effective treatment. · An investigation into the fate and behavior of pharmaceutically-active compounds in wastewater,



along with their potential environmental impacts. Additionally, accurate quantification procedures for these compounds are discussed. · The book covers new trends in the development of greener nanomaterials, evaluating their performance for abating emerging contaminants from wastewater. With its comprehensive insights and diverse perspectives, this book is an essential guide for researchers, professionals, and policymakers engaged in wastewater management and environmental protection. The practical solutions and scientific knowledge presented herein will contribute significantly to safeguarding our water resources and ensuring a cleaner and healthier future.