LEADER 05190nam 22008535 450 001 996465677903316 005 20200701042817.0 010 $a3-642-28320-9 024 7 $a10.1007/978-3-642-28320-8 035 $a(CKB)3360000000365882 035 $a(SSID)ssj0000666249 035 $a(PQKBManifestationID)11452706 035 $a(PQKBTitleCode)TC0000666249 035 $a(PQKBWorkID)10664224 035 $a(PQKB)11577065 035 $a(DE-He213)978-3-642-28320-8 035 $a(MiAaPQ)EBC3070204 035 $a(PPN)159087686 035 $a(EXLCZ)993360000000365882 100 $a20120217d2012 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aNew Frontiers in Applied Data Mining$b[electronic resource] $ePAKDD 2011 International Workshops, Shenzhen, China, May 24-27, 2011, Revised Selected Papers /$fedited by Longbing Cao, Joshua Zhexue Huang, James Bailey, Yun Sing Koh, Jun Luo 205 $a1st ed. 2012. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2012. 215 $a1 online resource (XXX, 508 p.) 225 1 $aLecture Notes in Artificial Intelligence ;$v7104 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-28319-5 320 $aIncludes bibliographical references and author index. 330 $aThis book constitutes the toroughly refereed post-conference proceedings of five international workshops held in conjunction with PAKDD 2011 in Shenzhen, China, in May 2011: the International Workshop on Behavior Informatics (BI 2011), the Workshop on Quality Issues, Measures of Interestingness and Evaluation of Data Mining Models (QIMIE 2011), the Workshop on Biologically Inspired Techniques for Data Mining (BDM 2011), the Workshop on Advances and Issues in Traditional Chinese Medicine Clinical Data Mining (AI-TCM 2011), and the Second Workshop on Data Mining for Healthcare Management (DMGHM 2011). The book also includes papers from the First PAKDD Doctoral Symposium on Data Mining (DSDM 2011). The 42 papers were carefully reviewed and selected from numerous submissions. The papers cover a wide range of topics discussing emerging techniques in the field of knowledge discovery in databases and their application domains extending to previously unexplored areas such as data mining based on optimization techniques from biological behavior of animals and applications in Traditional Chinese Medicine clinical research and health care management. 410 0$aLecture Notes in Artificial Intelligence ;$v7104 606 $aArtificial intelligence 606 $aDatabase management 606 $aInformation storage and retrieval 606 $aApplication software 606 $aPattern recognition 606 $aData mining 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aDatabase Management$3https://scigraph.springernature.com/ontologies/product-market-codes/I18024 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aPattern Recognition$3https://scigraph.springernature.com/ontologies/product-market-codes/I2203X 606 $aData Mining and Knowledge Discovery$3https://scigraph.springernature.com/ontologies/product-market-codes/I18030 615 0$aArtificial intelligence. 615 0$aDatabase management. 615 0$aInformation storage and retrieval. 615 0$aApplication software. 615 0$aPattern recognition. 615 0$aData mining. 615 14$aArtificial Intelligence. 615 24$aDatabase Management. 615 24$aInformation Storage and Retrieval. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aPattern Recognition. 615 24$aData Mining and Knowledge Discovery. 676 $a006.3 702 $aCao$b Longbing$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHuang$b Joshua Zhexue$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBailey$b James$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKoh$b Yun Sing$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLuo$b Jun$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Workshop on Behavior Informatics$f(2011 :$eShenzhen, China) 712 12$aQuality Issues, Measures of Interestingness and Evaluation of Data Mining Models Workshop$f(2011 :$eShenzhen, China) 712 12$aWorkshop on Biologically Inspired Techniques for Data Mining$f(2011 :$eShenzhen, China) 712 12$aWorkshop on Advances and Issues in Traditional Chinese Medicine Clinical Data Mining$f(2011 :$eShenzhen, China) 712 12$aWorkshop on Data Mining for Healthcare Management$d(2nd :$f2011 :$eShenzhen, China) 906 $aBOOK 912 $a996465677903316 996 $aNew Frontiers in Applied Data Mining$9774157 997 $aUNISA LEADER 01606nas 2200457-a 450 001 9910388670203321 005 20240413012153.0 035 $a(CKB)954921412379 035 $a(CONSER)---91650189- 035 $a(EXLCZ)99954921412379 100 $a19910205b19882002 --- - 101 0 $aeng 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aEuropean venture capital journal $eEuropean VCJ 210 $aLondon $cVenture Economics Ltd.$d-©2002 215 $a1 online resource 300 $a has subtitle: News and analysis of the private equity markets. 300 $aPublished: New York : Venture Economics, -July-Aug. 2002. 311 08$aPrint version: European venture capital journal : 0954-1675 (DLC) 91650189 (OCoLC)23059386 517 3 $aVenture capital journal 517 3 $aEuropean VCJ 517 3 $aVCJ 517 1 $aEVCJ 531 $aEUROPEAN VENTURE CAPITAL JOURNAL EUROPEAN VCJ 606 $aVenture capital$zEurope$vPeriodicals 606 $aVenture capital$2fast$3(OCoLC)fst01165298 607 $aEurope$2fast$1https://id.oclc.org/worldcat/entity/E39PBJxCxPbbk4CPJDQJb4r6rq 608 $aPeriodicals.$2fast 608 $aPeriodicals.$2lcgft 615 0$aVenture capital 615 7$aVenture capital. 676 $a332/.0415/09405 712 02$aVenture Economics Limited. 712 02$aVenture Economics sarl. 906 $aJOURNAL 912 $a9910388670203321 920 $aexl_impl conversion 996 $aEuropean venture capital journal$92157000 997 $aUNINA LEADER 04001nam 22005535 450 001 9910616393803321 005 20251225202020.0 010 $a9783031170812 010 $a3031170814 024 7 $a10.1007/978-3-031-17081-2 035 $a(MiAaPQ)EBC7107447 035 $a(Au-PeEL)EBL7107447 035 $a(CKB)24996016300041 035 $a(PPN)265857198 035 $a(BIP)85922667 035 $a(BIP)85408868 035 $a(DE-He213)978-3-031-17081-2 035 $a(EXLCZ)9924996016300041 100 $a20221005d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplied Cryptography in Computer and Communications $eSecond EAI International Conference, AC3 2022, Virtual Event, May 14-15, 2022, Proceedings /$fedited by Jingqiang Lin, Qiang Tang 205 $a1st ed. 2022. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2022. 215 $a1 online resource (229 pages) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v448 311 08$aPrint version: Lin, Jingqiang Applied Cryptography in Computer and Communications Cham : Springer,c2022 9783031170805 320 $aIncludes bibliographical references and index. 327 $aQuantum-Safe Cryptographic Solution -- DU-QS22: A Dataset for Analyzing QC-MDPC-based Quantum-Safe Cryptosystems -- Quantum-Safe Signing of Notification Messages in Intelligent Transport Systems -- Applied Cryptography for IoT -- WB-GWS: An IoT-Oriented Lightweight Gateway System Based on White-Box Cryptography -- Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment -- Resource Consumption Evaluation of C++ Cryptographic Libraries on Resource-Constrained Devices -- Authentication Protocol -- A Secure Lightweight RFID Mutual Authentication Protocol without Explicit Challenge-Response Pairs -- bisAUTH : A blockchain-inspired secure authentication protocol for IoT nodes -- Real-World Applied Cryptography -- X-FTPC: A Fine-grained Trust Propagation Control Scheme for Cross-Certification Utilizing Certificate Transparency -- The Block-based Mobile PDE Systems Are Not Secure - Experimental Attacks -- Black-box Testing ofCryptographic Algorithms Based on Data Characteristics -- Network Attack and Defense -- IoT Devices Classification base on Network Behavior Analysis -- Semi-supervised False Data Injection Attacks Detection in Smart Grid -- Security Application -- A Novel Logistics Scheme Based on Zero-trust Model -- ALFLAT: Chinese NER Using ALBERT,Flat-Lattice Transformer,Word Segmentation and Entity Dictionary. 330 $aThis book constitutes the refereed post-conference proceedings of the Second International Conference on Applied Cryptography in Computer and Communications, AC3 2022, held May 14-15, 2022 and due to COVID-19 pandemic virtually. The 12 revised full papers and 2 short papers were carefully reviewed and selected from 38 submissions. They were organized in topical sections as follows: quantum-safe cryptographic solution; applied cryptography for IoT; authentication protocol; real-world applied cryptography; network attack and defense; security application. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v448 606 $aApplication software 606 $aComputer and Information Systems Applications 615 0$aApplication software. 615 14$aComputer and Information Systems Applications. 676 $a929.605 676 $a005.8 702 $aLin$b Jingqiang 702 $aTang$b Qiang 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910616393803321 996 $aApplied cryptography in computer and communications$92814404 997 $aUNINA