LEADER 04554nam 22007815 450 001 9910616395803321 005 20250521124729.0 010 $a9783031180675 010 $a3031180674 024 7 $a10.1007/978-3-031-18067-5 035 $a(MiAaPQ)EBC7102134 035 $a(Au-PeEL)EBL7102134 035 $a(CKB)24950467600041 035 $a(PPN)264953541 035 $a(DE-He213)978-3-031-18067-5 035 $a(EXLCZ)9924950467600041 100 $a20220928d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyberspace Safety and Security $e14th International Symposium, CSS 2022, Xi'an, China, October 16?18, 2022, Proceedings /$fedited by Xiaofeng Chen, Jian Shen, Willy Susilo 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (381 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13547 300 $aIncludes index. 311 08$aPrint version: Chen, Xiaofeng Cyberspace Safety and Security Cham : Springer International Publishing AG,c2022 9783031180668 327 $aCryptography and its applications -- Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead -- Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare -- Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q) -- A Collaborative Access Control Scheme based on Incentive Mechanism -- Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing -- Updatable Hybrid Encryption Scheme with No-directional Key Update for Cloud Storage -- Data security -- FDLedger: Dynamic and Efficient Anonymous Audit for Distributed Ledgers -- A Method of Traceless File Deletion for NTFS File System -- Efficient and Collusion Resistant Multi-Party Private Set Intersection Protocols for Large Participants and Small Sets Setting -- Attack and defense techniques -- High Quality Audio Adversarial Examples without Using Psychoacoustics -- Working Mechanism of Eternalblue and Its Application in Ransomworm -- Substitution Attacks against Sigma Protocols -- A Multi-stage APT Attack Detection Method based on Sample Enhancement -- VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer -- Network security and its applications -- Improvised Model for Blockchain in Distributed Cloud Environment -- Multi-hop Multi-key Homomorphic Encryption with Less Noise under CRS Model -- Design of Anti-machine Learning Malicious Node System based on Blockchain. 330 $aThis book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace Safety and Security, CSS 2022, held in Xi?an, China, in October 2022.The 26 revised full papers presented were carefully reviewed and selected from 104 initial submissions. The papers focus on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13547 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputers 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aArtificial intelligence 606 $aData and Information Security 606 $aCryptology 606 $aComputing Milieux 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 606 $aArtificial Intelligence 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputers. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 0$aArtificial intelligence. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aComputing Milieux. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aArtificial Intelligence. 676 $a016.391 676 $a005.8 702 $aShen$b Jian 702 $aSusilo$b Willy 702 $aChen$b Xiaofeng 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910616395803321 996 $aCyberspace Safety and Security$92174991 997 $aUNINA