03297nam 2200505 450 99654795060331620230801215740.09783031306235(electronic bk.)978303130622810.1007/978-3-031-30623-5(MiAaPQ)EBC7241402(Au-PeEL)EBL7241402(OCoLC)1377819418(DE-He213)978-3-031-30623-5(PPN)269656480(EXLCZ)992652319950004120230801d2023 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierSecurity and privacy in new computing environments 5th EAI International Conference, SPNCE 2022, Xi'an, China, December 30-31, 2022, proceedings /edited by Qi Jiang, Xinghua Li, and Ding Wang1st ed. 2023.Cham, Switzerland :Springer,[2023]©20231 online resource (187 pages)Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,1867-822X ;496Print version: Jiang, Qi Security and Privacy in New Computing Environments Cham : Springer International Publishing AG,c2023 9783031306228 Includes bibliographical references and index.Authentication and key agreement -- User Authentication Using Body Vibration Characteristics -- An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server -- Efficient two-party authentication key agreement protocol using reconciliation mechanism from lattice -- Anonymous and Practical Multi-Factor Authentication for Mobile Devices Using Two-Server Architecture -- Data security -- Cross-chain Data Auditing for Medical IoT Data -- Outsourced Privacy-Preserving SVM Classifier Model over Encrypted Data in IoT -- A Scheme of Anti Gradient Leakage of Federated Learning Based on Blockchain -- Analysis of a New Improved AES S-box Structure Rong -- Network security -- Social Internet of Tings trust management based on implicit social relationship -- Romeo: SGX-based Software Anti-Piracy Framework -- P-TECS: An Energy Balance Algorithm for Opportunistic Networks Integrating Multiple Node Attributes -- Network Situation Awareness Model based on Incomplete Information Game.This book constitutes the refereed proceedings of the 5th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022, held in Xi’an, china, in December 30-31, 2022. The 12 full papers were selected from 38 submissions and are grouped in thematical parts as: authentication and key agreement; data security; network security.Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,1867-822X ;496Computer networksSecurity measuresCongressesComputer networksSecurity measures929.605Jiang QiLi XinghuaWang DingMiAaPQMiAaPQMiAaPQ996547950603316Security and Privacy in New Computing Environments2546874UNISA