LEADER 05068nam 22006615 450 001 9910350235603321 005 20200703201639.0 010 $a981-13-5913-X 024 7 $a10.1007/978-981-13-5913-2 035 $a(CKB)4100000007389713 035 $a(DE-He213)978-981-13-5913-2 035 $a(MiAaPQ)EBC5927013 035 $a(PPN)233800190 035 $a(EXLCZ)994100000007389713 100 $a20190108d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTrusted Computing and Information Security$b[electronic resource] $e12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers /$fedited by Huanguo Zhang, Bo Zhao, Fei Yan 205 $a1st ed. 2019. 210 1$aSingapore :$cSpringer Singapore :$cImprint: Springer,$d2019. 215 $a1 online resource (XII, 410 p. 145 illus., 60 illus. in color.) 225 1 $aCommunications in Computer and Information Science,$x1865-0929 ;$v960 311 $a981-13-5912-1 327 $aCiphertext-Policy Attribute-Based Encryption for Circuits from Lattices under Weak Security Model -- Impossible Differential Cryptanalysis of SPECK -- Detect Peer-To-Peer Botnet with Permutation Entropy and Adaptive Information Fusion -- Research of Snort Rule Extension and APT Detection Based on APT Network Behavior Analysis -- Network Risk Assessment Method Based on Asset Correlation Graph -- Password Guessing Based on Semantic Analysis and Neural Networks -- An Approach of Implementing SW-TPM in Real-Time Operating System -- A Multilevel Trusted Clustering Mechanism for the Awareness Layer of the Internet of Things -- A Multi-Layer Virtual Network Isolation Detection Method for Cloud Platform -- A Behavioral Measurement Model Suitable for the Sensing Nodes of Internet of Things -- An Efficient and Revocable Decentralizing Attribute-Based Encryption for Mobile Cloud Computing -- A Voting Scheme in Blockchain Based on Threshold Group Signature -- HABKS: Hierarchical Attribute-Based Keyword Search on Outsourcing Data -- A Trusted Measurement Model for Mobile Internet -- A Fast Identity Authentication Solution for the Sensing Layer in Internet of Things -- Cryptanalysis of an ElGamal-like Cryptosystem Based on Matrices over Group Rings -- An Analysis About the Defects of Windows UAC Mechanism -- A Privacy Protection Scheme in VANETs Based on Group Signature -- Analysis of Wireless Sensor Networks Behavior for Trustworthiness Evaluation -- Digging Evidence for Violation of Cloud Security Compliance with Knowledge Learned from Logs -- Two Anti-Quantum Attack Protocols for Secure multiparty Computation -- A Cloud Storage Data Access Control Scheme Based on Attribute-Sets Encryption -- Detecting Malicious URLs Using a Deep Learning Approach Based on Stacked Denoising Autoencoder -- Predicting Vulnerable Software Components via Bellwethers. 330 $aThis book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2018, held in Wuhan, China, in October 2018. The 24 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, and network security. 410 0$aCommunications in Computer and Information Science,$x1865-0929 ;$v960 606 $aComputer security 606 $aData encryption (Computer science) 606 $aApplication software 606 $aComputer communication systems 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSecurity Services$3https://scigraph.springernature.com/ontologies/product-market-codes/I28030 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aApplication software. 615 0$aComputer communication systems. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aSecurity Services. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aComputer Communication Networks. 676 $a787.61 702 $aZhang$b Huanguo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhao$b Bo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYan$b Fei$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910350235603321 996 $aTrusted Computing and Information Security$92193128 997 $aUNINA