LEADER 06881nam 22006735 450 001 996466200103316 005 20200701083725.0 010 $a3-030-36938-2 024 7 $a10.1007/978-3-030-36938-5 035 $a(CKB)4100000010013763 035 $a(MiAaPQ)EBC5992496 035 $a(DE-He213)978-3-030-36938-5 035 $a(PPN)242818536 035 $a(EXLCZ)994100000010013763 100 $a20191207d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aNetwork and System Security$b[electronic resource] $e13th International Conference, NSS 2019, Sapporo, Japan, December 15?18, 2019, Proceedings /$fedited by Joseph K. Liu, Xinyi Huang 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (xiii, 731 pages) $cillustrations 225 1 $aSecurity and Cryptology ;$v11928 311 $a3-030-36937-4 327 $aInvited Papers -- Measuring Security of Symmetric Encryption Schemes against On-the-Fly Side-Channel Key-Recovery Attacks -- Unsupervised Insider Detection through Neural Feature Learning and Model Optimisation -- Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey -- A Graph Database-based Approach to Analyze Network Log Files -- Full Papers -- A Privacy-Enhancing Framework for Internet of Things Services -- Using Audio Characteristics for Mobile Device Authentication -- Ethereum Analysis via Node Clustering -- Strong Known Related-Key Attacks and the Security of ECDSA -- Threat Assessment of Enterprise Applications via Graphical Modelling -- A Blockchain-based IoT Data Management System for Secure and Scalable Data Sharing -- Towards Secure Open Banking Architecture: An Evaluation with OWASP -- OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms -- OVERSCAN: OAuth 2.0 Scanner for Missing Parameters -- LaT-Voting: Traceable Anonymous E-Voting on Blockchain -- Distributed Secure Storage System Based on Blockchain and TPA -- SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique -- A Practical Dynamic Enhanced BFT protocol -- Pre-adjustment Based Anti-collusion Mechanism for Audio Signals -- Detecting Intruders by User File Access Patterns -- Blockchain-enabled Privacy-preserving Internet of Vehicles: Decentralized and Reputation-based Network Architecture -- Privacy Preserving Machine Learning with Limited Information Leakage -- Blockchain based Owner-Controlled Secure Software Updates for Resource-Constrained -- Sequential Aggregate MACs with Detecting Functionality Revisited -- A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System -- EEG-based Authentication with Variational Universal Background Model -- An Efficient Vulnerability Detection Model for Ethereum Smart Contracts -- A Comparative Study on Network Traffic Clustering -- Tell Them From Me: an Encrypted Application Profiler -- Indoor Security Localization Algorithm Based on Location Discrimination Ability of AP -- Gnocchi: Multiplexed Payment Channels for Cryptocurrencies -- Difficulty of decentralized structure due to rational user behavior on Blockchain -- A DNS Tunneling Detection method based on Deep Learning models to prevent Data Exfiltration -- Cryptanalysis of Raindrop and FBC -- Attribute Based Encryption with Publicly Verifiable Outsourced Decryption -- New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defense Cost -- Lattice based verifiably encrypted double authentication preventing Signatures -- Privacy-Preserving Sequential Data Publishing -- A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter -- Keyed Non-Parametric Hypothesis Tests: Protecting Machine Learning From Poisoning Attacks -- SparkDA: RDD-Based High Performance Data Anonymization Technique for Spark Platform -- Short Papers -- An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol -- Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices -- Privacy-preserving k-means clustering: an application to driving style Recognition -- Derandomized PACE with Mutual Authentication -- A Muti-attributes-based Trust Model of Internet of Vehicle -- Using Sparse Composite Document Vectors to Classify VBA Macros -- A High-Performance Hybrid Blockchain Systemfor Traceable IoT Applications. 330 $aThis book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019. The 36 full papers and 7 short papers presented together with 4 invited papers in this book were carefully reviewed and selected from 89 initial submissions. The papers cover a wide range of topics in the field, including authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems. 410 0$aSecurity and Cryptology ;$v11928 606 $aComputer security 606 $aData encryption (Computer science) 606 $aComputer organization 606 $aArtificial intelligence 606 $aApplication software 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aComputer organization. 615 0$aArtificial intelligence. 615 0$aApplication software. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aComputer Systems Organization and Communication Networks. 615 24$aArtificial Intelligence. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.8 702 $aLiu$b Joseph K$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHuang$b Xinyi$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466200103316 996 $aNetwork and system security$92088039 997 $aUNISA LEADER 03904nam 2200469 450 001 9910629587703321 005 20230515072615.0 024 7 $a10.1515/9783110772388 035 $a(CKB)5590000001000897 035 $a(NjHacI)995590000001000897 035 $a(EXLCZ)995590000001000897 100 $a20230515d2022 uy 0 101 0 $ager 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aJuden und ihre Nachbarn $eDie Wissenschaft des Judentums im Kontext von Diaspora und Migration /$fherausgegeben von Kerstin Schoor und Werner Tress 210 1$aBerlin ;$aBoston :$cDe Gruyter Oldenbourg,$d[2022] 210 4$dİ2022 215 $a1 online resource (viii, 244 pages) $cillustrations 225 1 $aEuropa?isch-ju?dische Studien. Beitra?ge ;$vBand 60 311 $a3-11-077249-3 320 $aIncludes bibliographical references (pages 221-238) and index. 327 $aFrontmatter -- Inhalt -- Einleitung -- EinSichten -- Lazarus Bendavid in Wien -- Osteuropa?isches Judentum zwischen akademischer Judenfeindschaft und Wissenschaft des Judentums -- Wissenschaft des Judentums und Zionismus -- Italienisch-ju?dische Gelehrte und ihre deutschen Nachbarn im 19. Jahrhundert -- Die Einheit von "Leben und Lehre" zwischen Verwissenschaftlichung und Bildungsreform -- Migration als Thema ju?discher Volkskunde und Ethnografie -- Im Objektiv der Kamera -- Aby Warburgs Kulturwissenschaftliche Bibliothek -- Ein transnationaler ju?discher Kanon als Verlagsprogramm -- Anhang -- Autorinnen und Autoren -- Literaturverzeichnis -- Abbildungsverzeichnis -- Index. 330 $a"Die Herausbildung einer ju?dischen Wissenschaftsbewegung, die von der Haskala des spa?ten 18. Jahrhunderts ihren Ausgang nahm und sich im 19. Jahrhundert in der Wissenschaft des Judentums manifestierte, war in vielfacher Hinsicht mit einer allgemeinen Transformation der Wissensordnungen in der Moderne verknu?pft und verlieh dieser zugleich erkennbare Pra?gungen. Die Beitra?ge des vorliegenden Bandes thematisieren diese Entwicklungen vor dem Hintergrund von Diaspora und Migrationsbewegungen im mittel- und osteuropa?ischen Raum. Sie zeigen in Untersuchungen zur Epistemologie wissenschaftlicher Praktiken, zur Genese methodischer Verfahren und Konzepte oder zum Austausch theoretischer Ansa?tze die Entwicklungen der Wissenschaft des Judentums vor allem im Hinblick auf deren Wirkungen in der nicht-ju?dischen Wissens- und Wissenschaftsgeschichte, in Politik, Literatur und Kunst. Unter dem Titel "Juden und ihre Nachbarn" sollen so die vielfa?ltigen Elemente einer gemeinsamen, verflochtenen Geschichte der ju?dischen und nicht-ju?dischen Kulturen Europas erkennbar werden"-- Source other than Library of Congress. "The contributions in this volume address developments in the emergence of a Jewish scholarship movement against the backdrop of diaspora and migration movements in Central and Eastern Europe. These studies on the epistemology of scholarly practices, on the genesis of methods and concepts, and exchange between theoretical approaches reveal the developments that took place in the Wissenschaft des Judentums (Jewish Scholarship) movement"--$cSource other than Library of Congress. 410 0$aEuropa?isch-ju?dische Studien.$pBeitra?ge ;$vBand 60. 606 $aJews$xIntellectual life 606 $aJewish learning and scholarship 606 $aWissenschaft des Judentums (Movement) 615 0$aJews$xIntellectual life. 615 0$aJewish learning and scholarship. 615 0$aWissenschaft des Judentums (Movement) 676 $a909.04924082 702 $aSchoor$b Kerstin 702 $aTress$b Werner$f1975- 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910629587703321 996 $aJuden und ihre Nachbarn$92898701 997 $aUNINA