LEADER 03465nam 2200517 450 001 9910640386003321 005 20230507160920.0 010 $a3-031-23098-1 024 7 $a10.1007/978-3-031-23098-1 035 $a(MiAaPQ)EBC7168733 035 $a(Au-PeEL)EBL7168733 035 $a(DE-He213)978-3-031-23098-1 035 $a(PPN)267807872 035 $a(EXLCZ)9925945674400041 100 $a20230507d2023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aEmerging information security and applications $eThird International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, proceedings /$fedited by Jiageng Chen, Debiao He, and Rongxing Lu 205 $a1st ed. 2022. 210 1$aCham, Switzerland :$cSpringer,$d[2023] 210 4$dİ2023 215 $a1 online resource (236 pages) 225 1 $aCommunications in Computer and Information Science,$x1865-0937 ;$v1641 300 $aIncludes index. 311 08$aPrint version: Chen, Jiageng Emerging Information Security and Applications Cham : Springer,c2023 9783031230974 327 $aAsymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography -- A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks -- Towards Low-Latency Big Data Infrastructure at Sangfor -- Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB -- Parallel Validity Analysis of the Boomerang Attack Model -- A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography -- Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis without q-type assumption -- AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels -- HBMD-FL:Heterogeneous Federated Learning Algorithm Based On Blockchain and Model Distillation -- Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET -- An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy -- D2CDIM:DID-based Decentralized Cross-domain Identity Management with Privacy-Preservation and Sybil-Resistance -- Link Aware Aggregation Query with Privacy-preserving Capability in Wireless Sensor Networks. 330 $aThis volume constitutes selected papers presented at the Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022. Due to COVID-19, EISA 2022 was held fully online. The 13 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. . 410 0$aCommunications in Computer and Information Science,$x1865-0937 ;$v1641 606 $aComputer networks$xSecurity measures 606 $aData protection$vCongresses 615 0$aComputer networks$xSecurity measures. 615 0$aData protection 676 $a004.6 702 $aHe$b Debiao 702 $aChen$b Jiageng 702 $aLu$b Rongxing 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910640386003321 996 $aEmerging information security and applications$92914839 997 $aUNINA