LEADER 05253nam 22007815 450 001 9910616393303321 005 20251225203625.0 010 $a9789811972423 010 $a9811972427 024 7 $a10.1007/978-981-19-7242-3 035 $a(MiAaPQ)EBC7107824 035 $a(Au-PeEL)EBL7107824 035 $a(CKB)25048815100041 035 $a(DE-He213)978-981-19-7242-3 035 $a(PPN)265857074 035 $a(EXLCZ)9925048815100041 100 $a20221007d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecurity and Privacy in Social Networks and Big Data $e8th International Symposium, SocialSec 2022, Xi'an, China, October 16?18, 2022, Proceedings /$fedited by Xiaofeng Chen, Xinyi Huang, Miros?aw Kuty?owski 205 $a1st ed. 2022. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2022. 215 $a1 online resource (372 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1663 311 08$aPrint version: Chen, Xiaofeng Security and Privacy in Social Networks and Big Data Singapore : Springer,c2022 9789811972416 327 $aCryptography and its applications -- Improved (t,n)-Threshold Proxy Signature Scheme -- Algorithm Substitution Attacks on Identity-Based Encryption -- Authenticated Continuous Top-k Spatial Keyword Search on Dynamic Objects -- Efficient Attribute-based Proxy Re-encryption for Secure Deduplication -- A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryption -- D2D Authentication Scheme for IoT-enabled Smart Home -- Inner Product Encryption from Middle-Product Learning with Errors -- Network security and privacy protection -- Publicly Verifiable Private Set Intersection from Homomorphic Encryption -- Secure Asynchronous Federated Learning for Edge Computing Devices -- FedBC: An Efficient and Privacy-preserving Federated Consensus Scheme -- A Secure and Privacy-preserving Authentication Scheme in IoMT -- Secure and Efficient k-Nearest Neighbor Query with Privacy-Preserving Authentication -- A Network Security Situation Assessment Method Based on Multi-attention Mechanism and HHO-ResNeXt -- A Privacy-Preserving Federated Learning with Mutual Verification on Vector Spaces -- Data detection -- Patch-based Backdoors Detection and Mitigation with Feature Masking -- Detection and Defense Against DDoS Attack on SDN Controller Based on Feature Selection -- Commodity-Tra: A Traceable Transaction Scheme Based on FISCO BCOS -- A Defect Heterogeneous Risk Assessment Method with Misclassification Cost -- Squeeze-Loss: A Utility-Free Defense Against Membership Inference Attacks -- Blockchain and its applications -- Improved WAVE Signature and Apply to Post-Quantum Blockchain -- Secure Government Data Sharing Based on Blockchain and Attribute-Based Encryption -- Secure Data Storage Scheme of Judicial System based on Blockchain -- Judicial Evidence Storage Scheme Based on Smart Contract. 330 $aThis book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022. The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of advancement of the field?s foundations. They were organized in topical sections as follows: Cryptography and its applications; Network security and privacy protection; Data detection; Blockchain and its applications. 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1663 606 $aComputer networks$xSecurity measures 606 $aApplication software 606 $aSoftware engineering 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputer networks 606 $aMobile and Network Security 606 $aComputer and Information Systems Applications 606 $aSoftware Engineering 606 $aCryptology 606 $aData and Information Security 606 $aComputer Communication Networks 615 0$aComputer networks$xSecurity measures. 615 0$aApplication software. 615 0$aSoftware engineering. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aData protection. 615 0$aComputer networks. 615 14$aMobile and Network Security. 615 24$aComputer and Information Systems Applications. 615 24$aSoftware Engineering. 615 24$aCryptology. 615 24$aData and Information Security. 615 24$aComputer Communication Networks. 676 $a005.8 700 $aChen$b Xiaofeng$0850517 702 $aHuang$b Xinyi 702 $aKuty?owski$b Miros?aw 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910616393303321 996 $aSecurity and privacy in social networks and big data$93041735 997 $aUNINA