LEADER 04801oam 2200493 450 001 996464384203316 005 20210623134723.0 010 $a3-030-66922-X 024 7 $a10.1007/978-3-030-66922-5 035 $a(CKB)4100000011728519 035 $a(DE-He213)978-3-030-66922-5 035 $a(MiAaPQ)EBC6461912 035 $a(PPN)253253829 035 $a(EXLCZ)994100000011728519 100 $a20210623d2021 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aSecurity and Privacy in New Computing Environments $ethird EAI international conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, proceedings /$fDing Wang, Weizhi Meng, Jinguang Han (editors) 205 $a1st ed. 2021. 210 1$aCham, Switzerland :$cSpringer,$d[2021] 210 4$d©2021 215 $a1 online resource (XIII, 462 p. 122 illus., 108 illus. in color.) 225 1 $aLecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;$v344 300 $aIncludes index. 311 $a3-030-66921-1 327 $aNetwork Security -- A Characterisation of Smart Grid DoS Attacks -- Security and Privacy in 5G Applications: Challenges and Solutions -- Alarm Elements based Adaptive Network Security Situation Prediction Model -- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback -- System Security -- Research on IoT Security Technology and Standardization in the 5G Era -- MIMEC Based Information System Security Situation Assessment Model -- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings -- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain -- Machine Learning -- Research on a Hybrid EMD-SVR Model for Time Series Prediction -- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity -- User Identity Linkage across Social Networks based on Neural Tensor Network -- An Efficient and Privacy-Preserving Physiological Case Classification Scheme for E-healthcare System -- A multi-class detection system for Android malicious Apps based on color image features -- Authentication and Access Control -- PUF-based Two-factor Group Authentication in Smart Home -- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems -- Access Control for Wireless Body Area Networks -- FIDO - that dog won?t hunt -- Blockchain-enabled user authentication in zero trust Internet of Things -- Cloud Security -- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage -- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain -- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data -- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration -- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing -- Cryptography -- Generative image steganography based on digital Cardan Grille -- Pixel Grouping Based Image Hashing for DIBR 3D Image -- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP -- Applied Cryptography -- A Verifiable Combinatorial Auction Scheme with Bidder?s Privacy Protection -- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query -- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User -- A3BAC: Attribute-Based Access Control Model with Anonymous Access -- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid. 330 $aThis book constitutes the refereed proceedings of the Third International Conference on Security and Privacy in New Computing Environments, SPNCE 2020, held in August 2020. Due to COVID-19 pandemic the conference was held virtually. The 31 full papers were selected from 63 submissions and are grouped into topics on network security; system security; machine learning; authentication and access control; cloud security; cryptography; applied cryptography. 410 0$aLecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering ;$v344. 606 $aCloud computing$xSecurity measures$vCongresses 615 0$aCloud computing$xSecurity measures 676 $a004 702 $aWang$b Ding 702 $aMeng$b Weizhi$f1986- 702 $aHan$b Jinguang 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a996464384203316 996 $aSecurity and Privacy in New Computing Environments$92546874 997 $aUNISA