top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Algorithmic Aspects in Information and Management [[electronic resource] ] : 6th International Conference, AAIM 2010, Weihai, China, July 19-21, 2010. Proceedings / / edited by Bo Chen
Algorithmic Aspects in Information and Management [[electronic resource] ] : 6th International Conference, AAIM 2010, Weihai, China, July 19-21, 2010. Proceedings / / edited by Bo Chen
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XI, 336 p. 51 illus.)
Disciplina 005.1
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Software engineering
Computer programming
Computers
Algorithms
Computer science—Mathematics
Management information systems
Computer science
Software Engineering/Programming and Operating Systems
Programming Techniques
Theory of Computation
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Management of Computing and Information Systems
ISBN 1-280-38791-2
9786613565839
3-642-14355-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Comparison of Two Algorithms for Computing Page Importance -- The Invisible Hand for Risk Averse Investment in Electricity Generation -- Efficient Algorithms for the Prize Collecting Steiner Tree Problems with Interval Data -- The (K,k)-Capacitated Spanning Tree Problem -- Optimal Algorithms for the Economic Lot-Sizing Problem with Multi-supplier -- Synthetic Road Networks -- Computing Exact and Approximate Nash Equilibria in 2-Player Games -- Where Would Refinancing Preferences Go? -- Approximating Maximum Edge 2-Coloring in Simple Graphs -- A Linear Kernel for Co-Path/Cycle Packing -- A VaR Algorithm for Warrants Portfolio -- Some Results on Incremental Vertex Cover Problem -- Finding Good Tours for Huge Euclidean TSP Instances by Iterative Backbone Contraction -- Point Location in the Continuous-Time Moving Network -- Coordinated Scheduling of Production and Delivery with Production Window and Delivery Capacity Constraints -- Inverse 1-median Problem on Trees under Weighted l ??? Norm -- On the Approximability of the Vertex Cover and Related Problems -- Feasibility Testing for Dial-a-Ride Problems -- Indexing Similar DNA Sequences -- Online Scheduling on Two Uniform Machines to Minimize the Makespan with a Periodic Availability Constraint -- A New Smoothing Newton Method for Symmetric Cone Complementarity Problems -- Approximation Algorithms for Scheduling with a Variable Machine Maintenance -- Bounded Parallel-Batch Scheduling on Unrelated Parallel Machines -- Exact Algorithms for Coloring Graphs While Avoiding Monochromatic Cycles -- Randomized Approaches for Nearest Neighbor Search in Metric Space When Computing the Pairwise Distance Is Extremely Expensive -- A Primal-Dual Approximation Algorithm for the k-Level Stochastic Facility Location Problem -- Optimal Semi-online Scheduling Algorithms on Two Parallel Identical Machines under a Grade of Service Provision -- Varieties of Regularities in Weighted Sequences -- Online Uniformly Inserting Points on Grid -- Kernelization for Cycle Transversal Problems -- Online Splitting Interval Scheduling on m Identical Machines -- Extended Tabu Search on Fuzzy Traveling Salesman Problem in Multi-criteria Analysis -- Efficient Exact and Approximate Algorithms for the Complement of Maximal Strip Recovery.
Record Nr. UNISA-996465662203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Algorithmic aspects in information and management : 6th International Conference, AAIM 2010 Weihai, China, July 19-21, 2010 : proceedings / / Bo Chen (ed.)
Algorithmic aspects in information and management : 6th International Conference, AAIM 2010 Weihai, China, July 19-21, 2010 : proceedings / / Bo Chen (ed.)
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, : Springer, 2010
Descrizione fisica 1 online resource (XI, 336 p. 51 illus.)
Disciplina 005.1
Altri autori (Persone) ChenBo
Collana Lecture notes in computer science
LNCS sublibrary : SL 3 : Information systems and application, incl. internet/web and HCI
Soggetto topico Algorithms
ISBN 1-280-38791-2
9786613565839
3-642-14355-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Comparison of Two Algorithms for Computing Page Importance -- The Invisible Hand for Risk Averse Investment in Electricity Generation -- Efficient Algorithms for the Prize Collecting Steiner Tree Problems with Interval Data -- The (K,k)-Capacitated Spanning Tree Problem -- Optimal Algorithms for the Economic Lot-Sizing Problem with Multi-supplier -- Synthetic Road Networks -- Computing Exact and Approximate Nash Equilibria in 2-Player Games -- Where Would Refinancing Preferences Go? -- Approximating Maximum Edge 2-Coloring in Simple Graphs -- A Linear Kernel for Co-Path/Cycle Packing -- A VaR Algorithm for Warrants Portfolio -- Some Results on Incremental Vertex Cover Problem -- Finding Good Tours for Huge Euclidean TSP Instances by Iterative Backbone Contraction -- Point Location in the Continuous-Time Moving Network -- Coordinated Scheduling of Production and Delivery with Production Window and Delivery Capacity Constraints -- Inverse 1-median Problem on Trees under Weighted l ??? Norm -- On the Approximability of the Vertex Cover and Related Problems -- Feasibility Testing for Dial-a-Ride Problems -- Indexing Similar DNA Sequences -- Online Scheduling on Two Uniform Machines to Minimize the Makespan with a Periodic Availability Constraint -- A New Smoothing Newton Method for Symmetric Cone Complementarity Problems -- Approximation Algorithms for Scheduling with a Variable Machine Maintenance -- Bounded Parallel-Batch Scheduling on Unrelated Parallel Machines -- Exact Algorithms for Coloring Graphs While Avoiding Monochromatic Cycles -- Randomized Approaches for Nearest Neighbor Search in Metric Space When Computing the Pairwise Distance Is Extremely Expensive -- A Primal-Dual Approximation Algorithm for the k-Level Stochastic Facility Location Problem -- Optimal Semi-online Scheduling Algorithms on Two Parallel Identical Machines under a Grade of Service Provision -- Varieties of Regularities in Weighted Sequences -- Online Uniformly Inserting Points on Grid -- Kernelization for Cycle Transversal Problems -- Online Splitting Interval Scheduling on m Identical Machines -- Extended Tabu Search on Fuzzy Traveling Salesman Problem in Multi-criteria Analysis -- Efficient Exact and Approximate Algorithms for the Complement of Maximal Strip Recovery.
Record Nr. UNINA-9910483739703321
Berlin, : Springer, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied cryptography in computer and communications : first EAI International Conference, AC3 2021, virtual event, May 15-16, 2021, proceedings / / Bo Chen, Xinyi Huang (editors)
Applied cryptography in computer and communications : first EAI International Conference, AC3 2021, virtual event, May 15-16, 2021, proceedings / / Bo Chen, Xinyi Huang (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (216 pages)
Disciplina 005.82
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Data encryption (Computer science)
Telecommunication systems - Security measures
Internet of things - Security measures
Huang, Xinyi
ISBN 3-030-80851-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Blockchain -- Anchor: An NDN-Based Blockchain Network -- 1 Introduction -- 2 Our Design -- 2.1 Random Anchor Selection -- 2.2 Two-Layer Cascaded NDN Design -- 2.3 Elimination of Duplicated Transmissions from Multiple Anchors -- 3 Performance Evaluation -- 4 Conclusion -- References -- An Identity-Based Blind Signature and Its Application for Privacy Preservation in Bitcoin -- 1 Introduction -- 2 Preliminaries -- 2.1 Tate Bilinear Pairings -- 2.2 Computational Diffie-Hellman Assumption -- 2.3 System Model -- 3 Review of Sarde et al.' Blind Signature Scheme -- 4 Attack on Sarde et al.' Blind Signature Scheme -- 5 Unlinkable ID-Based Blind Signature Scheme -- 6 Unlinkable ID-Based Proxy Blind Signature Scheme -- 7 Security Analysis -- 7.1 Analysis of Blind Signature -- 7.2 Analysis of Proxy Blind Signature -- 8 Performance Analysis and Comparison -- 9 Application for Privacy Preservation in Bitcoin -- References -- Blockchain-Based Sealed-Bid Domain Name Auction Protocol -- 1 Introduction -- 2 Models and Design Goals -- 2.1 System Model -- 2.2 Security Model -- 2.3 Design Goal -- 3 Preliminaries -- 3.1 Account-Based Consortium Blockchain -- 3.2 Auction Types -- 3.3 Pedersen Commitment -- 3.4 Zero-Knowledge Proof -- 4 Our Proposal -- 4.1 Create the Auction -- 4.2 Commit the Bid -- 4.3 Reveal the Bid -- 4.4 Close the Auction -- 5 Analysis of Our Proposal -- 5.1 Security Analysis -- 5.2 Performance Evaluation -- 6 Related Work -- 6.1 Blockchain-Based DNS -- 6.2 Blockchain-Based Auction -- 7 Conclusion -- References -- Authentication -- A Security Enhanced Key Management Service for ARM Pointer Authentication -- 1 Introduction -- 2 Background -- 2.1 Privilege and Exception Levels -- 2.2 Pointer Authentication -- 3 Threat Model -- 3.1 Attacks -- 3.2 Assumptions -- 4 Design -- 4.1 Architecture.
4.2 Algorithm -- 5 Implementation -- 5.1 EL3 Runtime Service -- 5.2 EL1 Kernel Module -- 5.3 EL0 Calling Convention -- 6 Evaluation -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 7 Related Works -- 8 Conclusion -- References -- Privacy-Preserving ECC-Based Three-Factor Authentication Protocol for Smart Remote Vehicle Control System -- 1 Introduction -- 1.1 Threat Model -- 1.2 Related Works -- 1.3 Motivation and Contribution -- 1.4 Notations -- 1.5 Paper Organization -- 2 Review of Chatterjee et al.'s Scheme -- 2.1 System Initialization and Registration Phase -- 2.2 Authentication and Key Agreement Phase -- 3 Cryptanalysis of Chatterjee et al.'s Scheme -- 4 The Proposed Scheme -- 4.1 Pre-deployment Phase -- 4.2 User Registration Phase -- 4.3 Login and Authentication Phase -- 5 Security Analysis -- 5.1 BAN-Logic Based Proof of Authentication -- 5.2 Further Security Analysis -- 6 Performance Evaluation -- 6.1 Security Features -- 6.2 Computational Overhead -- 7 Conclusion and Future Work -- References -- Secure Computation -- Efficient and Private Divisible Double Auction in Trusted Execution Environment -- 1 Introduction -- 2 Divisible Double Auction -- 2.1 Models -- 2.2 Auction Properties -- 3 Mechanism Design -- 4 ETA System Design -- 4.1 SGX Formalization -- 4.2 ETA System -- 4.3 ETA Execution Program -- 4.4 Threat Model -- 4.5 Security Analysis -- 5 Experiments -- 5.1 ETA Performance Evaluation -- 5.2 Case Study -- 6 Related Work -- 7 Conclusion -- References -- Parallel Implementation and Optimization of SM4 Based on CUDA -- 1 Introduction -- 2 Preliminaries -- 2.1 CUDA -- 2.2 A Brief Description of SM4 -- 3 Parallel Design of SM4 -- 4 Experiment and Discussion -- 4.1 Basic Experiment -- 4.2 Performance Optimization -- 4.3 Analysis of Results -- 5 Conclusion -- References -- Another Algebraic Decomposition Method for Masked Implementation.
1 Introduction -- 2 Preliminaries -- 2.1 Functions over Finite Fields -- 3 Algebraic Decomposition -- 3.1 Algebraic Decomposition Using GM Polynomials -- 3.2 Experimental Result -- 4 Application to Masking -- 5 Conclusion -- A Masking for Quadratic Polynomial -- References -- Practical Crypto Application -- Concealed Communication in Online Social Networks -- 1 Introduction -- 2 Related Work -- 2.1 Privacy Analysis in Online Social Networks -- 2.2 Privacy Leakages -- 2.3 Privacy-Preserving Online Social Networks -- 2.4 Mix Networks -- 3 Proposed Protocols -- 3.1 A Concealed Secure Channel -- 3.2 User Information and Postings -- 3.3 Personal Messages and Group Messages -- 3.4 Groups -- 3.5 Finding and Verifying Participants, Exchanging Keys -- 3.6 Key Revocation -- 3.7 User Registration -- 4 Privacy Analysis -- 4.1 Attacker Model -- 4.2 Structure of Network (NS) -- 4.3 Structure of Data (DS) -- 4.4 Timing (T) -- 4.5 Control Information (CI) -- 5 Performance Analysis -- 6 Conclusions -- References -- MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile Devices -- 1 Introduction -- 2 Background -- 2.1 Wearable Mobile Devices -- 2.2 Plausibly Deniable Encryption -- 2.3 Image Steganography -- 2.4 Digital Watermarking -- 2.5 Peak Signal-to-Noise Ratio (PSNR) -- 3 Model and Assumptions -- 3.1 System Model -- 3.2 Adversarial Model -- 4 Design -- 4.1 Design Rationale -- 4.2 Design Details -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Evaluation -- 6 Security Analysis and Discussion -- 6.1 Security Analysis -- 6.2 Discussion -- 7 Related Work -- 7.1 Plausibly Deniable Encryption Systems -- 7.2 Image Steganograyphy -- 8 Conclusion -- References -- Recent Advances in the Web PKI and the Technical Challenges in SCMS -- 1 Introduction -- 2 Recent Advances in the Web PKI -- 2.1 Certificate Transparency.
2.2 Push-Based Certificate Revocation -- 3 The Technical Challenges in SCMS -- 3.1 The Expected Properties of V2V PKI Systems -- 3.2 SCMS -- 3.3 Technical Challenge #1: Certificate Transparency vs. Pseudonym Certificate -- 3.4 Technical Challenge #2: Push-Based Certificate Revocation vs. the Great Volume of Pseudonym Certificates -- 4 Conclusions -- References -- The First International Workshop on Security for Internet of Things (IOTS 2021) -- A Novel Approach for Code Smells Detection Based on Deep Leaning -- 1 Introduction -- 2 Code Smells Detection Based on Convolutional Networks -- 3 High Level Design -- 3.1 Experiments Results -- 4 Conclusion -- References -- A Thieves Identification Scheme for Prepaid Systems in Smart Grids -- 1 Introduction -- 2 Related Work -- 3 The Framework -- 3.1 Network Model -- 3.2 Security Requirements -- 4 Our Proposed Approach -- 4.1 Setup -- 4.2 Joining -- 4.3 Power Purchasing -- 4.4 Power Requesting -- 4.5 Identification -- 5 Conclusion -- References -- Using Smart Contracts to Improve Searchable Symmetric Encryption -- 1 Introduction -- 2 Notations -- 3 Preliminaries -- 3.1 Scheme of Searchable Symmetric Encryption -- 3.2 Smart Contract -- 4 Scheme of the Integrity Verification of Search Results -- 4.1 Merkle Tree -- 4.2 Proof of Integrity Verification of Search Results -- 5 Smart Contract Based Searchable Symmetric Encryption -- 5.1 Scheme of Smart Contract Based SSE -- 5.2 Details of Smart Contract Based SSE Scheme -- 6 Security and Performance Analyses -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 6.3 Experimental Analysis -- 7 Conclusion -- References -- Towards the Adaptability of Traffic-Based IoT Security Management Systems to the Device Behavior Evolutions -- 1 Introduction -- 2 IoT Security Management Systems -- 3 IoT Device Behavior Evolutions -- 4 Possible Solutions -- 5 Conclusion.
References -- Author Index.
Record Nr. UNISA-996464420203316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied cryptography in computer and communications : first EAI International Conference, AC3 2021, virtual event, May 15-16, 2021, proceedings / / Bo Chen, Xinyi Huang (editors)
Applied cryptography in computer and communications : first EAI International Conference, AC3 2021, virtual event, May 15-16, 2021, proceedings / / Bo Chen, Xinyi Huang (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (216 pages)
Disciplina 005.82
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Data encryption (Computer science)
Telecommunication systems - Security measures
Internet of things - Security measures
Huang, Xinyi
ISBN 3-030-80851-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Blockchain -- Anchor: An NDN-Based Blockchain Network -- 1 Introduction -- 2 Our Design -- 2.1 Random Anchor Selection -- 2.2 Two-Layer Cascaded NDN Design -- 2.3 Elimination of Duplicated Transmissions from Multiple Anchors -- 3 Performance Evaluation -- 4 Conclusion -- References -- An Identity-Based Blind Signature and Its Application for Privacy Preservation in Bitcoin -- 1 Introduction -- 2 Preliminaries -- 2.1 Tate Bilinear Pairings -- 2.2 Computational Diffie-Hellman Assumption -- 2.3 System Model -- 3 Review of Sarde et al.' Blind Signature Scheme -- 4 Attack on Sarde et al.' Blind Signature Scheme -- 5 Unlinkable ID-Based Blind Signature Scheme -- 6 Unlinkable ID-Based Proxy Blind Signature Scheme -- 7 Security Analysis -- 7.1 Analysis of Blind Signature -- 7.2 Analysis of Proxy Blind Signature -- 8 Performance Analysis and Comparison -- 9 Application for Privacy Preservation in Bitcoin -- References -- Blockchain-Based Sealed-Bid Domain Name Auction Protocol -- 1 Introduction -- 2 Models and Design Goals -- 2.1 System Model -- 2.2 Security Model -- 2.3 Design Goal -- 3 Preliminaries -- 3.1 Account-Based Consortium Blockchain -- 3.2 Auction Types -- 3.3 Pedersen Commitment -- 3.4 Zero-Knowledge Proof -- 4 Our Proposal -- 4.1 Create the Auction -- 4.2 Commit the Bid -- 4.3 Reveal the Bid -- 4.4 Close the Auction -- 5 Analysis of Our Proposal -- 5.1 Security Analysis -- 5.2 Performance Evaluation -- 6 Related Work -- 6.1 Blockchain-Based DNS -- 6.2 Blockchain-Based Auction -- 7 Conclusion -- References -- Authentication -- A Security Enhanced Key Management Service for ARM Pointer Authentication -- 1 Introduction -- 2 Background -- 2.1 Privilege and Exception Levels -- 2.2 Pointer Authentication -- 3 Threat Model -- 3.1 Attacks -- 3.2 Assumptions -- 4 Design -- 4.1 Architecture.
4.2 Algorithm -- 5 Implementation -- 5.1 EL3 Runtime Service -- 5.2 EL1 Kernel Module -- 5.3 EL0 Calling Convention -- 6 Evaluation -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 7 Related Works -- 8 Conclusion -- References -- Privacy-Preserving ECC-Based Three-Factor Authentication Protocol for Smart Remote Vehicle Control System -- 1 Introduction -- 1.1 Threat Model -- 1.2 Related Works -- 1.3 Motivation and Contribution -- 1.4 Notations -- 1.5 Paper Organization -- 2 Review of Chatterjee et al.'s Scheme -- 2.1 System Initialization and Registration Phase -- 2.2 Authentication and Key Agreement Phase -- 3 Cryptanalysis of Chatterjee et al.'s Scheme -- 4 The Proposed Scheme -- 4.1 Pre-deployment Phase -- 4.2 User Registration Phase -- 4.3 Login and Authentication Phase -- 5 Security Analysis -- 5.1 BAN-Logic Based Proof of Authentication -- 5.2 Further Security Analysis -- 6 Performance Evaluation -- 6.1 Security Features -- 6.2 Computational Overhead -- 7 Conclusion and Future Work -- References -- Secure Computation -- Efficient and Private Divisible Double Auction in Trusted Execution Environment -- 1 Introduction -- 2 Divisible Double Auction -- 2.1 Models -- 2.2 Auction Properties -- 3 Mechanism Design -- 4 ETA System Design -- 4.1 SGX Formalization -- 4.2 ETA System -- 4.3 ETA Execution Program -- 4.4 Threat Model -- 4.5 Security Analysis -- 5 Experiments -- 5.1 ETA Performance Evaluation -- 5.2 Case Study -- 6 Related Work -- 7 Conclusion -- References -- Parallel Implementation and Optimization of SM4 Based on CUDA -- 1 Introduction -- 2 Preliminaries -- 2.1 CUDA -- 2.2 A Brief Description of SM4 -- 3 Parallel Design of SM4 -- 4 Experiment and Discussion -- 4.1 Basic Experiment -- 4.2 Performance Optimization -- 4.3 Analysis of Results -- 5 Conclusion -- References -- Another Algebraic Decomposition Method for Masked Implementation.
1 Introduction -- 2 Preliminaries -- 2.1 Functions over Finite Fields -- 3 Algebraic Decomposition -- 3.1 Algebraic Decomposition Using GM Polynomials -- 3.2 Experimental Result -- 4 Application to Masking -- 5 Conclusion -- A Masking for Quadratic Polynomial -- References -- Practical Crypto Application -- Concealed Communication in Online Social Networks -- 1 Introduction -- 2 Related Work -- 2.1 Privacy Analysis in Online Social Networks -- 2.2 Privacy Leakages -- 2.3 Privacy-Preserving Online Social Networks -- 2.4 Mix Networks -- 3 Proposed Protocols -- 3.1 A Concealed Secure Channel -- 3.2 User Information and Postings -- 3.3 Personal Messages and Group Messages -- 3.4 Groups -- 3.5 Finding and Verifying Participants, Exchanging Keys -- 3.6 Key Revocation -- 3.7 User Registration -- 4 Privacy Analysis -- 4.1 Attacker Model -- 4.2 Structure of Network (NS) -- 4.3 Structure of Data (DS) -- 4.4 Timing (T) -- 4.5 Control Information (CI) -- 5 Performance Analysis -- 6 Conclusions -- References -- MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile Devices -- 1 Introduction -- 2 Background -- 2.1 Wearable Mobile Devices -- 2.2 Plausibly Deniable Encryption -- 2.3 Image Steganography -- 2.4 Digital Watermarking -- 2.5 Peak Signal-to-Noise Ratio (PSNR) -- 3 Model and Assumptions -- 3.1 System Model -- 3.2 Adversarial Model -- 4 Design -- 4.1 Design Rationale -- 4.2 Design Details -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Evaluation -- 6 Security Analysis and Discussion -- 6.1 Security Analysis -- 6.2 Discussion -- 7 Related Work -- 7.1 Plausibly Deniable Encryption Systems -- 7.2 Image Steganograyphy -- 8 Conclusion -- References -- Recent Advances in the Web PKI and the Technical Challenges in SCMS -- 1 Introduction -- 2 Recent Advances in the Web PKI -- 2.1 Certificate Transparency.
2.2 Push-Based Certificate Revocation -- 3 The Technical Challenges in SCMS -- 3.1 The Expected Properties of V2V PKI Systems -- 3.2 SCMS -- 3.3 Technical Challenge #1: Certificate Transparency vs. Pseudonym Certificate -- 3.4 Technical Challenge #2: Push-Based Certificate Revocation vs. the Great Volume of Pseudonym Certificates -- 4 Conclusions -- References -- The First International Workshop on Security for Internet of Things (IOTS 2021) -- A Novel Approach for Code Smells Detection Based on Deep Leaning -- 1 Introduction -- 2 Code Smells Detection Based on Convolutional Networks -- 3 High Level Design -- 3.1 Experiments Results -- 4 Conclusion -- References -- A Thieves Identification Scheme for Prepaid Systems in Smart Grids -- 1 Introduction -- 2 Related Work -- 3 The Framework -- 3.1 Network Model -- 3.2 Security Requirements -- 4 Our Proposed Approach -- 4.1 Setup -- 4.2 Joining -- 4.3 Power Purchasing -- 4.4 Power Requesting -- 4.5 Identification -- 5 Conclusion -- References -- Using Smart Contracts to Improve Searchable Symmetric Encryption -- 1 Introduction -- 2 Notations -- 3 Preliminaries -- 3.1 Scheme of Searchable Symmetric Encryption -- 3.2 Smart Contract -- 4 Scheme of the Integrity Verification of Search Results -- 4.1 Merkle Tree -- 4.2 Proof of Integrity Verification of Search Results -- 5 Smart Contract Based Searchable Symmetric Encryption -- 5.1 Scheme of Smart Contract Based SSE -- 5.2 Details of Smart Contract Based SSE Scheme -- 6 Security and Performance Analyses -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 6.3 Experimental Analysis -- 7 Conclusion -- References -- Towards the Adaptability of Traffic-Based IoT Security Management Systems to the Device Behavior Evolutions -- 1 Introduction -- 2 IoT Security Management Systems -- 3 IoT Device Behavior Evolutions -- 4 Possible Solutions -- 5 Conclusion.
References -- Author Index.
Record Nr. UNINA-9910490025803321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Distributed Fusion Estimation for Sensor Networks with Communication Constraints / / by Wen-An Zhang, Bo Chen, Haiyu Song, Li Yu
Distributed Fusion Estimation for Sensor Networks with Communication Constraints / / by Wen-An Zhang, Bo Chen, Haiyu Song, Li Yu
Autore Zhang Wen-An
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XII, 210 p. 96 illus., 38 illus. in color.)
Disciplina 629.8
Soggetto topico Control engineering
Signal processing
Image processing
Speech processing systems
Electrical engineering
Computer communication systems
Control and Systems Theory
Signal, Image and Speech Processing
Communications Engineering, Networks
Computer Communication Networks
ISBN 981-10-0795-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Multi-Rate Kalman Fusion Estimation for WSNs -- Kalman Fusion Estimation for WSNs with Non-Uniform Estimation Rates -- H1 Fusion Estimation for WSNs with Non-Uniform Sampling Rates -- Fusion Estimation for WSNs Using Dimension Reduction Method -- H1 Fusion Estimation for WSNs with Quantization -- Hierarchical Asynchronous Fusion Estimation for WSNs -- Fusion Estimation for WSNs with Delayed Measurements -- Fusion Estimation for WSNs with Delays and Packet Losses.
Record Nr. UNINA-9910254227903321
Zhang Wen-An  
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Emerging low-dimensional materials / / by Bo Chen, Rutao Wang, Nana Wang, editors
Emerging low-dimensional materials / / by Bo Chen, Rutao Wang, Nana Wang, editors
Pubbl/distr/stampa Basel : , : MDPI - Multidisciplinary Digital Publishing Institute, , [2023]
Descrizione fisica 1 online resource (166 pages)
Disciplina 537.623
Soggetto topico Superconductivity
ISBN 3-0365-6829-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910683381803321
Basel : , : MDPI - Multidisciplinary Digital Publishing Institute, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 11th International Conference on Computer Engineering and Networks
Proceedings of the 11th International Conference on Computer Engineering and Networks
Autore Liu Qi
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2021
Descrizione fisica 1 online resource (1699 pages)
Altri autori (Persone) LiuXiaodong
ChenBo
ZhangYiming
PengJiansheng
Collana Lecture Notes in Electrical Engineering Ser.
Soggetto genere / forma Electronic books.
ISBN 9789811665547
9789811665530
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- IOTS Internet of Things and Smart Systems -- A Double Incentive Trading Mechanism for IoT and Blockchain Based Electricity Trading in Local Energy Market -- 1 Introduction -- 2 Blockchain-Based Local Energy Market -- 3 Methodology -- 3.1 System Architecture -- 3.2 Transaction Mechanism -- 4 Case Study -- 5 Conclusion -- References -- A Survey on Task Offloading in Edge Computing for Smart Grid -- 1 Introduction -- 2 Edge Computing -- 2.1 Definition of Edge Computing -- 2.2 Architecture of Edge Computing -- 3 Task Offloading in Edge Computing -- 3.1 The Classification of Task Offloading -- 3.2 Task Unloading Process -- 3.3 Task Offloading Scenario -- 4 Challenges and Future Works -- 5 Conclusion -- References -- Data Fusion of Power IoT Based on GOWA Operator and D-S Evidence Theory -- 1 Introduction -- 2 Related Works -- 3 DFMD -- 4 Simulation -- 4.1 Datasets -- 4.2 Simulation Results -- 5 Conclusion -- References -- Edge Task Offloading Method for Power Internet of Things Based on Multi-round Combined Auction -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 Algorithm Design Based on Auction Model -- 4.1 Tender Submission Stage -- 4.2 Resource Block Pre-allocation Phase -- 4.3 Winner Determination Stage -- 5 Experimental Evaluation -- 6 Conclusion -- References -- VEC-MOTAG: Vehicular Edge Computing Based Moving Target Defense System -- 1 Introduction -- 2 Related Work -- 3 Threat Model and System Overview -- 4 System Design: Vehicular Edge Computing Based MOTAG System -- 4.1 Accessibility Constraint -- 4.2 QoS Constraints -- 4.3 Capacity Constraints -- 5 Evaluation -- 6 Conclusion -- References -- AIA Artificial Intelligence and Applications -- Short-Term Wind Power Forecasting Based on the Deep Learning Approach Optimized by the Improved T-distributed Stochastic Neighbor Embedding.
1 Introduction -- 2 Proposed Approaches -- 2.1 Wind Power Forecasting Model Architecture Design -- 2.2 Data Preprocessing of the Wind Power Time Series -- 2.3 Metrics Design for Wind Power Forecasting -- 3 Experiments -- 4 Conclusions -- References -- Adaptive Image Steganographic Analysis System Based on Deep Convolutional Neural Network -- 1 Introduction -- 2 Adaptive Image Steganography Analysis Method -- 2.1 Deep Convolutional Neural Network Structure -- 2.2 Steganalysis Method -- 3 Model Training -- 3.1 Experimental Data and Platform -- 3.2 Experimental Results and Analysis -- 4 System Design -- 4.1 System Framework Design -- 4.2 System Function -- 5 Conclusion -- References -- An Efficient Channel Attention CNN for Facial Expression Recognition -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Face Detection and Correction -- 3.2 Improved Network Framework Based on DenseNet -- 3.3 Loss Function -- 4 Experiment -- 4.1 Experimental Platform -- 4.2 Experimental Results -- 5 Conclusion -- References -- Handwritten Digit Recognition Application Based on Fully Connected Neural Network -- 1 Introduction -- 2 Key Technologies of Fully Connected Neural Network in Handwritten Digit Recognition -- 2.1 Activation Function -- 2.2 Sigmoid Function -- 2.3 Relu Function -- 2.4 Loss Function -- 2.5 The Core Code of the Fully Connected Neural Network in the Application of Handwritten Digit Recognition -- 3 MNIST Data Set -- 3.1 Analysis of Results -- References -- Detection System of Truck Blind Area Based on YOLOv3 -- 1 The Introduction -- 2 YOLOv3 -- 2.1 Introduction to YOLOV3 Algorithm -- 2.2 YOLO3 Network Structure -- 3 System is Introduced -- 3.1 System Architecture Diagram -- 3.2 The System Design -- 4 The System Test -- 4.1 The Test Environment -- 4.2 Test Indicators -- 4.3 The Experimental Process -- 5 Conclusion -- References.
Driver Fatigue Detection Algorithm Based on SMO Algorithm -- 1 Introduction -- 2 Fatigue State Recognition Based on Machine Vision -- 2.1 Face Feature Location -- 2.2 Extraction of Eye Feature Parameters Based on SMO Selection Strategy -- 2.3 Training Test Based on the Opening and Closing Degree of Human Eyes -- 3 Simulation Experiment -- 4 Conclusion -- References -- Image Mosaic Technology Based on Harris Corner Feature -- 1 Introduction -- 2 Theory and Technology -- 2.1 Image Registration -- 2.2 Harris Image Feature Extraction -- 2.3 Calculation of Homography Matrix -- 3 Image Mosaic Process -- 3.1 Feature Point Capture -- 3.2 Adaptive Non-maximum Suppression -- 3.3 Description of Key Points -- 3.4 Matching of Key Points -- 3.5 The Composition of New Images -- 4 Experiment -- 4.1 Image Mosaic of Existing Data Sets -- 4.2 Actual Shot Image -- 5 Concludes -- References -- Image Semantic Segmentation Based on Joint Normalization -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Network Structure -- 3.2 Normalization Method -- 4 Experiment -- 4.1 Dataset -- 4.2 Analysis -- 5 Conclusion -- References -- DeepINN: Identifying Influential Nodes Based on Deep Learning Method -- 1 Introduction -- 2 Related Work -- 2.1 Node Identification Method Based on Node Ranking Method -- 2.2 Network Embedding Method -- 3 DeepINN -- 3.1 Node Similarity Based on Network Embedding -- 3.2 Node Sampling Algorithm Based on Community Structure -- 3.3 Node Screening Strategy Based on Influential Communities -- 4 Experimental Results -- 4.1 Data Preparation -- 4.2 Parameter Settings of the Network Embedding Methods -- 4.3 Results -- 5 Conclusion -- References -- Lightweight Semantic Segmentation Convolutional Neural Network Based on SKNet -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 The Network Structure -- 3.2 SKNet -- 4 Experiment.
4.1 Experimental Environment -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- References -- The Research on Image Detection and Extraction Method Based on Yin and Yang Discrete Points -- 1 Introduction -- 2 Design of the Sampling Method of Yin and Yang Discrete Points -- 2.1 Yin and Yang Discrete Points Sampling -- 2.2 Parameter Tuning of Discrete Point Sampling Method -- 2.3 Analysis of Anti-noise Interference Ability -- 2.4 Constructing Independent Regions of Discrete Graphs -- 3 Research on Shape Detection and Extraction Based on Yin And Yang Discrete Points -- 4 Experimental Results -- 5 Conclusion -- References -- Research on Short-Term Power Load Prediction Based on Deep Learning -- 1 Introduction -- 2 Deep Learning Models -- 3 Prediction Results and Analysis of Power Short-Term Load Models -- 4 Conclusion -- References -- Image Repair Methods Based on Deep Residual Networks -- 1 Related Work -- 2 Body Method -- 2.1 Repair the Module -- 2.2 Mitigation Module -- 2.3 Loss Function -- 3 Analysis of Experimental Results -- 4 Conclusions -- References -- Real-Time Traffic Sign Detection Based on Improved YOLO V3 -- 1 Introduction -- 2 YOLO V3 Target Detection Algorithm -- 3 Data Collection and Data Enhancement -- 3.1 Data Collection -- 3.2 Data Enhancement -- 4 Analysis of Experimental Simulation Results -- 5 Conclusion -- References -- Design of Ground Station for Fire Fighting Robot -- 1 Introduction -- 2 Ground Station Design -- 2.1 Basic Composition of Ground Stations -- 2.2 Operating System Module -- 2.3 Wireless Communication Module -- 2.4 Power Module -- 3 Project Design -- 3.1 Wireless Communication Module Design -- 3.2 Power Module Design -- 3.3 Overall Design Diagram Design -- 4 Conclusion -- References -- Baby Expression Recognition System Design and Implementation Based on Deep Learning -- 1 Introduction -- 2 Related Work.
2.1 Deep Learning Based on Neural Networks -- 2.2 Expression Detection and Correction -- 2.3 Face Recognition Technology -- 3 System Design -- 3.1 General Interface Design -- 3.2 Objective Comparison -- 3.3 System Module -- 3.4 Software Testing -- 4 Conclusion -- References -- Handwriting Imitation with Generative Adversarial Networks -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 4 Experiment -- 4.1 Data Set -- 4.2 Experiment Result -- 5 Conclusion -- 6 Expectation -- References -- Epidemic Real-Time Monitor Based on Spark Streaming Real-Time Computing Algorithm -- 1 Introduction -- 2 Related Work -- 2.1 Introduction to Spark -- 2.2 Introduction to Spark Streaming -- 2.3 Comparison of the Advantages and Disadvantages of Spark Streaming and Storm -- 3 Method -- 3.1 Algorithm Introduction -- 3.2 Algorithm Implementation -- 4 Experiments -- 4.1 Test Results -- 5 Conclusion -- References -- Design and Implementation of Fruit and Vegetable Vending Machine Based on Deep Vision -- 1 Introduction -- 2 System Hardware Design -- 3 System Programming -- 3.1 System Control Terminal Design -- 3.2 System Recognition Terminal Program Design -- 4 Overall System Debugging -- 5 Summary and Outlook -- References -- Design and Implementation of License Plate Recognition System Based on Android -- 1 Introduction -- 2 The Overall Algorithm Flow of the System -- 3 Image Preprocessing -- 3.1 Image Grayscale Algorithm Selection -- 3.2 Image Binarization Algorithm Selection -- 3.3 Edge Detection Algorithm Selection -- 3.4 Morphological Processing -- 4 License Plate Positioning -- 5 Character Segmentation Test and Analysis -- 6 Application Design -- 7 Summary and Outlook -- References -- Pseudo-block Diagonally Dominant Matrix Based on Bipartite Non-singular Block Eigenvalues -- 1 Introduction.
2 Quasi-block Diagonally Dominant Matrix Based on Bipartite Non-singular Block Eigenvalues.
Record Nr. UNINA-9910508457803321
Liu Qi  
Singapore : , : Springer Singapore Pte. Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Privacy in Cyber-Physical Systems and Smart Vehicles [[electronic resource] ] : First EAI International Conference, SmartSP 2023, Chicago, USA, October 12-13, 2023, Proceedings / / edited by Yu Chen, Chung-Wei Lin, Bo Chen, Qi Zhu
Security and Privacy in Cyber-Physical Systems and Smart Vehicles [[electronic resource] ] : First EAI International Conference, SmartSP 2023, Chicago, USA, October 12-13, 2023, Proceedings / / edited by Yu Chen, Chung-Wei Lin, Bo Chen, Qi Zhu
Autore Chen Yu
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (181 pages)
Disciplina 005.3
Altri autori (Persone) LinChung-Wei
ChenBo
ZhuQi
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Application software
Computer systems
Telecommunication
Computer networks
Computers, Special purpose
Artificial intelligence
Computer and Information Systems Applications
Computer System Implementation
Communications Engineering, Networks
Computer Communication Networks
Special Purpose and Application-Based Systems
Artificial Intelligence
ISBN 3-031-51630-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Exploring Vulnerabilities in Voice Command Skills for Connected Vehicles -- Enabling Real-Time Restoration of Compromised ECU Firmware in Connected and Autonomous Vehicles -- mmFingerprint: A New Application Fingerprinting -- Technique via mmWave Sensing and Its Use in Rowhammer Detection -- ADC-Bank: Detecting Acoustic Out-of-Band Signal -- Injection on Inertial Sensors -- An Efficient and Smooth Path Planner Based on Hybrid Embracing Semi-Supervised Domain Adaptation for Federated Knowledge Transfer -- A Lightweight Reputation System for UAV Networks -- Resilient Range-only Cooperative Positioning of Multiple Smart Unmanned Aerial Systems -- Securing the Future: Exploring Privacy Risks and Security -- Questions in Robotic Systems -- Waves of Knowledge: A Comparative Study of Electromagnetic and Power Side-Channel Monitoring in Embedded Systems.
Record Nr. UNINA-9910831008803321
Chen Yu  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui