LEADER 01176nam0-2200349 --450 001 9910253450503321 005 20190320104230.0 010 $a978-88-6434-099-9 020 $aIT$b2016-5594 100 $a20180209d2015----kmuy0itay5050 ba 101 0 $aita 102 $aIT 105 $aa 001yy 200 1 $aArma nostra sunt libri$emanoscritti e incunaboli miniati dalla Biblioteca di San Domenico Maggiore di Napoli$fAndrea Improta$gpresentazione di Alessandra Perriccioli Saggese 210 $aFirenze$cNerbini$d2015 215 $a326 p.$cill.$d24 cm 225 1 $aBiblioteca di memorie domenicane$v12 610 0 $aIncunaboli miniati$aSec. 15. 610 0 $aNapoli - Convento di San Domenico Maggiore - Biblioteca - Cataloghi 676 $a745.670902$v23$zita 676 $a011.42 700 1$aImprota,$bAndrea$0715958 702 1$aPerriccioli Saggese,$bAlessandra 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910253450503321 952 $a60 745.67 IMPA 2015$b493/2017$fFAGBC 952 $a011.42 IMP 1$bBIBL. 2019$fFLFBC 959 $aFAGBC 959 $aFLFBC 996 $aArma nostra sunt libri$91386236 997 $aUNINA LEADER 07543nam 22007695 450 001 9910484106403321 005 20251107173723.0 010 $a3-319-72389-8 024 7 $a10.1007/978-3-319-72389-1 035 $a(CKB)4100000001381785 035 $a(DE-He213)978-3-319-72389-1 035 $a(MiAaPQ)EBC6298893 035 $a(MiAaPQ)EBC5591214 035 $a(Au-PeEL)EBL5591214 035 $a(OCoLC)1015336429 035 $a(PPN)222227885 035 $a(EXLCZ)994100000001381785 100 $a20171206d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity, Privacy, and Anonymity in Computation, Communication, and Storage $e10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedings /$fedited by Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XVIII, 610 p. 200 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v10656 311 08$a3-319-72388-X 320 $aIncludes bibliographical references and index. 327 $aOptimized Analysis Based on Improved Mutation and Crossover Operator for Differential Evolution Algorithm -- Revisiting Localization Attacks in Mobile App People-Nearby Services -- Lengthening Unidimensional Continuous-variable Quantum Key Distribution with Noiseless Linear Amplifier -- Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext -- An Attack to an Anonymous Certi cateless Group Key Agreement Scheme and its Improvement -- A Space Effcient Algorithm for LCIS Problem -- Improving the Efficiency of Dynamic Programming in Big Data Computing -- Traceable and Complete Fine-Grained Revocable Multi-Authority Attribute-Based Encryption Scheme in Social Network -- The All Seeing Eye: Web to App Intercommunication for Session Fingerprinting in Android -- An Efficient Hierarchical Identity-Based Encryption Scheme for the Key Escrow -- An Improved Pre-Copy Transmission Algorithm in Mobile Cloud Computing -- Motivation of DDOS Attack-Aware Link Assignment between Switches to SDN Controllers -- TIM: A Trust Insurance Mechanism for Network Function Virtualization Based on Trusted Computing -- Personalized Semantic Location Privacy Preservation Algorithm Based on Query Processing Cost Optimization -- Smartphone Bloatware: An Overlooked Privacy Problem -- An ECC-Based off-line Anonymous Grouping-proof Protocol -- PCSD: A Tool for Android Malware Detection -- Authorship Analysis of Social Media Contents Using Tone and Personality Features -- Privacy-Preserving Handover Authentication Protocol from Lightweight Identity-Based Signature for Wireless Networks -- Spatial Outlier Information Hiding Algorithm Based on Complex Transformation -- A Reputation Model Considering Repurchase Behavior and Mechanism Design to Promote Repurchase -- Chinese Named Entity Recognition Based on B-LSTM Neural Network with Additional Features -- Amplified Locality-Sensitive Hashing for Privacypreserving Distributed Service Recommendation -- Learn to Accelerate Identifying New TestCases in Fuzzing -- Service Selection Based on User Privacy Risk Evaluation -- An Efficient Lattice-Based Proxy Signature with Message Recovery -- FABAC: A Flexible Fuzzy Attribute-Based Access Control Mechanism -- Security Analysis and Improvement of An Anonymous Attribute-Based Proxy Re-encryption -- Relacha: Using Associative Meaning for Image Captcha Understandability -- Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces -- A Formal Android Permission Model Based on the B Method -- S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks -- MCloud: Efficient Monitoring Framework for Cloud Computing Platforms -- Secure Vibration Control of Flexible Arms based on Operators' Behaviors -- A New Color Image Encryption Scheme Based on Chaotic Hénon Map and Lü System -- A Distributed Authentication Protocol using Identity-based Encryption and Blockchain for LEO Network -- A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation -- A Unified Model for Detecting Privacy Leakage on Android -- Multi-party Security Computation with Differential Privacy Over Outsourced Data -- REW-SMT: A New Approach for Rewriting XACML Request with Dynamic Big Data Security Policies -- Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine Introspection -- Privacy Preserving Hierarchical Clustering over Multi-Party Data Distribution -- Improving MQTT by Inclusion of Usage Control -- Using JSON to Specify Privacy Preserving-enabled Attribute-based Access Control Policies -- Comprehensive Diversity in Recommender Systems -- Towards Intelligent System Wide Information Management for Air Traffic Management -- A Security Risk Management Model for Cloud Computing Systems: Infrastructure As A Service. . 330 $aThis book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The 47 papers presented in this volume were carefully reviewed and selected from 140 submissions. They deal with research findings, achievements, innovations and perspectives in information security and related fields covering topics such as security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v10656 606 $aData protection 606 $aComputer networks 606 $aComputer engineering 606 $aCryptography 606 $aData encryption (Computer science) 606 $aArtificial intelligence 606 $aData and Information Security 606 $aComputer Communication Networks 606 $aComputer Engineering and Networks 606 $aCryptology 606 $aArtificial Intelligence 615 0$aData protection. 615 0$aComputer networks. 615 0$aComputer engineering. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aArtificial intelligence. 615 14$aData and Information Security. 615 24$aComputer Communication Networks. 615 24$aComputer Engineering and Networks. 615 24$aCryptology. 615 24$aArtificial Intelligence. 676 $a004 702 $aWang$b Guojun$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAtiquzzaman$b Mohammed$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYan$b Zheng$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aChoo$b Kim-Kwang Raymond$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484106403321 996 $aSecurity, Privacy, and Anonymity in Computation, Communication, and Storage$92295526 997 $aUNINA