LEADER 05408nam 22007935 450 001 9910349306203321 005 20200701090514.0 010 $a3-030-29729-2 024 7 $a10.1007/978-3-030-29729-9 035 $a(CKB)4100000008959012 035 $a(DE-He213)978-3-030-29729-9 035 $a(MiAaPQ)EBC5927586 035 $a(PPN)254819265 035 $a(EXLCZ)994100000008959012 100 $a20190813d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplied Cryptography and Network Security Workshops $eACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5?7, 2019, Proceedings /$fedited by Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XIV, 193 p. 41 illus., 28 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11605 311 $a3-030-29728-4 327 $aSiMLA - Security in Machine Learning and its Applications -- Risk-based Static Authentication in Web Applications with Behavioral Biometrics and Session Context Analytics -- Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks -- Cloud S&P - Cloud Security and Privacy -- Graphene: A Secure Cloud Communication Architecture -- A Survey on Machine Learning applications for Software Defined Network Security -- AIBlock - Application Intelligence and Blockchain Security -- A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equations -- BSIEM-IoT: A Blockchain-based and Distributed SIEM for the Internet of Things -- Towards Blockchained Challenge-based Collaborative Intrusion Detection -- AIoTS - Artificial Intelligence and Industrial Internet-of-Things Security -- Enhancement to the Privacy-aware Authentication for Wi-Fi based Indoor Positioning Systems -- Design of a FDIA Resilient Protection Scheme for Power Networks by Securing Minimal Sensor Set -- Strong Leakage Resilient Encryption by Hiding Partial Ciphertext. 330 $aThis book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019. The 10 papers presented in this volume were carefully reviewed and selected from 30 submissions. They stem from the following workshops: AIBlock 2019: First International Workshop on Application Intelligence and Blockchain Security AIoTS 2019: First International Workshop on Articial Intelligence and Industrial Internet-of-Things Security Cloud S&P 2019: First International Workshop on Cloud Security and Privacy PriDA 2019: First InternationalWorkshop on Privacy-preserving Distributed Data Analysis SiMLA 2019: First International Workshop on Security in Machine Learning and its Applications. 410 0$aSecurity and Cryptology ;$v11605 606 $aComputer security 606 $aComputer communication systems 606 $aComputer networks$xSecurity measures 606 $aData encryption (Computer science) 606 $aMachine learning 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aMachine Learning$3https://scigraph.springernature.com/ontologies/product-market-codes/I21010 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aComputer networks$xSecurity measures. 615 0$aData encryption (Computer science). 615 0$aMachine learning. 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aMobile and Network Security. 615 24$aCryptology. 615 24$aMachine Learning. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.82 676 $a005.82 702 $aZhou$b Jianying$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDeng$b Robert$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLi$b Zhou$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMajumdar$b Suryadipta$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMeng$b Weizhi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Lingyu$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhang$b Kehuan$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910349306203321 996 $aApplied cryptography and network security workshops$92278657 997 $aUNINA