LEADER 03297nam 2200505 450 001 996547950603316 005 20230801215740.0 010 $a9783031306235$b(electronic bk.) 010 $z9783031306228 024 7 $a10.1007/978-3-031-30623-5 035 $a(MiAaPQ)EBC7241402 035 $a(Au-PeEL)EBL7241402 035 $a(OCoLC)1377819418 035 $a(DE-He213)978-3-031-30623-5 035 $a(PPN)269656480 035 $a(EXLCZ)9926523199500041 100 $a20230801d2023 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aSecurity and privacy in new computing environments $e5th EAI International Conference, SPNCE 2022, Xi'an, China, December 30-31, 2022, proceedings /$fedited by Qi Jiang, Xinghua Li, and Ding Wang 205 $a1st ed. 2023. 210 1$aCham, Switzerland :$cSpringer,$d[2023] 210 4$dİ2023 215 $a1 online resource (187 pages) 225 1 $aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v496 311 08$aPrint version: Jiang, Qi Security and Privacy in New Computing Environments Cham : Springer International Publishing AG,c2023 9783031306228 320 $aIncludes bibliographical references and index. 327 $aAuthentication and key agreement -- User Authentication Using Body Vibration Characteristics -- An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server -- Efficient two-party authentication key agreement protocol using reconciliation mechanism from lattice -- Anonymous and Practical Multi-Factor Authentication for Mobile Devices Using Two-Server Architecture -- Data security -- Cross-chain Data Auditing for Medical IoT Data -- Outsourced Privacy-Preserving SVM Classifier Model over Encrypted Data in IoT -- A Scheme of Anti Gradient Leakage of Federated Learning Based on Blockchain -- Analysis of a New Improved AES S-box Structure Rong -- Network security -- Social Internet of Tings trust management based on implicit social relationship -- Romeo: SGX-based Software Anti-Piracy Framework -- P-TECS: An Energy Balance Algorithm for Opportunistic Networks Integrating Multiple Node Attributes -- Network Situation Awareness Model based on Incomplete Information Game. 330 $aThis book constitutes the refereed proceedings of the 5th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022, held in Xi?an, china, in December 30-31, 2022. The 12 full papers were selected from 38 submissions and are grouped in thematical parts as: authentication and key agreement; data security; network security. 410 0$aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,$x1867-822X ;$v496 606 $aComputer networks$xSecurity measures$vCongresses 615 0$aComputer networks$xSecurity measures 676 $a929.605 702 $aJiang$b Qi 702 $aLi$b Xinghua 702 $aWang$b Ding 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a996547950603316 996 $aSecurity and Privacy in New Computing Environments$92546874 997 $aUNISA