LEADER 05158nam 22007095 450 001 996465353203316 005 20200703163309.0 010 $a981-15-3418-7 024 7 $a10.1007/978-981-15-3418-8 035 $a(CKB)4100000010480312 035 $a(DE-He213)978-981-15-3418-8 035 $a(MiAaPQ)EBC6113061 035 $a(PPN)24297967X 035 $a(EXLCZ)994100000010480312 100 $a20200219d2020 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTrusted Computing and Information Security$b[electronic resource] $e13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24?27, 2019, Revised Selected Papers /$fedited by Weili Han, Liehuang Zhu, Fei Yan 205 $a1st ed. 2020. 210 1$aSingapore :$cSpringer Singapore :$cImprint: Springer,$d2020. 215 $a1 online resource (XII, 356 p. 166 illus., 79 illus. in color.) 225 1 $aCommunications in Computer and Information Science,$x1865-0929 ;$v1149 311 $a981-15-3417-9 327 $aGenerative image Steganography based on GANs -- Partial blind proxy re-signature scheme for mobile internet -- Information Flow-Based Security Construction for Compositional Interface Automata -- Provably secure server-assisted verification threshold proxy re-signature scheme -- ReJection: A AST-based Reentrancy Vulnerability Detection Method -- Identity authentication under Internet of everything based on edge computing -- STC: Improving the Performance of Virtual Machines Based on Task Classification -- A Method for Realizing Covert Communication at Router Driving Layer -- A secure multi-party signature scheme based on trust mechanism -- Virtual FPGA Placement with An Efficient Ant Colony Optimization -- Identity-based threshold group signature scheme of Blockchain verification -- ByteDroid: Android Malware Detection using Deep Learning on Bytecode Sequences -- Research on Multidimensional System Security Assessment Based on AHP and Gray Correlation -- Research on Software Network Key Nodes Mining Methods Based on Complex Network -- Research and development of TPM virtualization -- A Secure Certificateless Identity Authentication Scheme Based on Blockchain -- A trust-based security research method for Internet of things terminal -- A QoS&SLA-driven Multifaceted Trust Model for Cloud Computing -- A Lossless Data hiding Scheme in Public Key Encrypted Domain based on homomorphic Key-Switching -- A Detection Approach for Buffer Overflow Vulnerability based on Data Control Flow Graph -- Outsourced Data Integrity Auditing for E?cient Batch Dynamic Updates -- Secure Personal Health Records Sharing based on Blockchain and IPFS. . 330 $aThis book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2019, held in Shanghai, China, in October 2019. The 22 revised full papers presented were carefully reviewed and selected from 247 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, network security, information hiding. . 410 0$aCommunications in Computer and Information Science,$x1865-0929 ;$v1149 606 $aComputer networks$xSecurity measures 606 $aComputer security 606 $aComputer communication systems 606 $aApplication software 606 $aData encryption (Computer science) 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 606 $aSecurity Services$3https://scigraph.springernature.com/ontologies/product-market-codes/I28030 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aApplication software. 615 0$aData encryption (Computer science). 615 14$aMobile and Network Security. 615 24$aSecurity Services. 615 24$aComputer Communication Networks. 615 24$aInformation Systems Applications (incl. Internet). 615 24$aCryptology. 615 24$aSystems and Data Security. 676 $a005.8 702 $aHan$b Weili$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhu$b Liehuang$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYan$b Fei$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465353203316 996 $aTrusted Computing and Information Security$92193128 997 $aUNISA