Blockchain - ICBC 2023 : 6th International Conference, held as part of the Services Conference Federation, SCF 2023, Honolulu, HI, USA, September 23-26, 2023, Proceedings / / Qin Wang, Jun Feng, and Liang-Jie Zhang, editors |
Edizione | [First edition.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023] |
Descrizione fisica | 1 online resource (xv, 147 pages) : illustrations (some color) |
Disciplina | 338.064 |
Collana | Lecture Notes in Computer Science Series |
Soggetto topico | Blockchains (Databases) |
ISBN | 3-031-44920-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Research Track -- DARSAN: A Decentralized Review System Suitable for NFT Marketplaces -- Bringing Web 3.0 and DAO Into Democratic Class: A Study of Pedagogy in Higher Education -- A Blockchain-Based Micro-Services Architecture for Distributed Business -- SoK: X-Assisted BFT Consensus Protocols -- Machine Learning and Blockchain Intersection in Cryptocurrency Price Prediction -- A Secure Contact Tracing Method Using Smart Contracts With Considering Privacy -- Comparison of Smart Contract Platforms From the Perspective of Developers -- Framework for Design and Development of Blockchain Applications Using Smart Contracts -- Application and Industry Track -- Vehicle Ownership, Leasing, and Rental Blockchain Protocol VOLR BP. |
Record Nr. | UNINA-9910746954203321 |
Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Blockchain - ICBC 2023 : 6th International Conference, held as part of the Services Conference Federation, SCF 2023, Honolulu, HI, USA, September 23-26, 2023, Proceedings / / Qin Wang, Jun Feng, and Liang-Jie Zhang, editors |
Edizione | [First edition.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023] |
Descrizione fisica | 1 online resource (xv, 147 pages) : illustrations (some color) |
Disciplina | 338.064 |
Collana | Lecture Notes in Computer Science Series |
Soggetto topico | Blockchains (Databases) |
ISBN | 3-031-44920-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Research Track -- DARSAN: A Decentralized Review System Suitable for NFT Marketplaces -- Bringing Web 3.0 and DAO Into Democratic Class: A Study of Pedagogy in Higher Education -- A Blockchain-Based Micro-Services Architecture for Distributed Business -- SoK: X-Assisted BFT Consensus Protocols -- Machine Learning and Blockchain Intersection in Cryptocurrency Price Prediction -- A Secure Contact Tracing Method Using Smart Contracts With Considering Privacy -- Comparison of Smart Contract Platforms From the Perspective of Developers -- Framework for Design and Development of Blockchain Applications Using Smart Contracts -- Application and Industry Track -- Vehicle Ownership, Leasing, and Rental Blockchain Protocol VOLR BP. |
Record Nr. | UNISA-996552462503316 |
Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security, Privacy, and Anonymity in Computation, Communication, and Storage [[electronic resource] ] : SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14–17, 2019, Proceedings / / edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XV, 332 p. 127 illus., 97 illus. in color.) |
Disciplina | 658.478 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Data protection
Computer organization Computers Optical data processing Artificial intelligence Security Computer Systems Organization and Communication Networks Information Systems and Communication Service Image Processing and Computer Vision Artificial Intelligence |
ISBN | 3-030-24900-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The 8th International Symposium on Security and Privacy on Internet of Things (SPIoT 2019) -- Robust Hybrid Lightweight Cryptosystem for Protecting IoT Smart Devices -- A Weighted Risk Score Model for IoT Devices -- Connected Vehicles: A Privacy Analysis -- Privacy-Preserving Big Data Analytics: From Theory to Practice -- The 9th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2019) -- A Framework to Identify People in Unstructured Environments Incorporating Biometrics -- Continuous Authentication Using Mouse Clickstream Data Analysis -- Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net -- Cost-Efficient Task Scheduling for Geo-distributed Data Analytics -- Task Scheduling for Streaming Applications in A Cloud-Edge System -- The 5th International Symposium on Sensor-Cloud Systems (SCS 2019) -- Limited Memory Eigenvector Recursive Principal Component Analysis in Sensor-Cloud Based Adaptive Operational Modal Online Identification -- Optimization of Optical Imaging MIMO-OFDM Precoding Matrix -- Data Collection Scheme for Underwater Sensor Cloud System Based on Fog Computing -- A Survey on Fog Computing -- An Approximate Data Collection Algorithm in Space-based Internet of Things -- Outlier Detection of Internet of Vehicles -- Review of Power Spatio-Temporal Big Data Technologies, Applications, and Challenges -- CP-MCNN:Multi-label Chest X-ray Diagnostic based on Con dence Predictor and CNN -- Naive Approach for Bounding Box Annotation and Object Detection towards Smart Retail Systems -- Evaluation of Face Recognition Techniques Based on Symlet 2 Wavelet and Support Vector Machine -- The 11th International Symposium on UbiSafe Computing (UbiSafe 2019) -- An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation -- Lightweight Distributed Attribute Based Keyword Search System for Internet of Things -- Continuous Objects Detection Based on Optimized Greedy Algorithm in IoT Sensing Networks Distributed Service Recommendation -- The 11th International Workshop on Security in e-Science and e-Research (ISSR 2019) -- Software Quality Assurance: Tools & Techniques -- A Campus Carpooling System Based on GPS Trajectories -- The 2019 International Workshop on Cybersecurity Metrics and Risk Modeling (CMRM 2019) -- Web-based Intelligence for IDS -- Predictably Deterrable? The Case of System Trespassers. |
Record Nr. | UNISA-996466178903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security, Privacy, and Anonymity in Computation, Communication, and Storage [[electronic resource] ] : 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14–17, 2019, Proceedings / / edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVI, 506 p. 317 illus., 142 illus. in color.) |
Disciplina | 005.8 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Data protection
Computers Computer organization Artificial intelligence Security Computing Milieux Information Systems and Communication Service Computer Systems Organization and Communication Networks Artificial Intelligence |
ISBN | 3-030-24907-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Protecting Your Smartphone from Theft Using Accelerometer -- Ransomware Attack Protection: A Cryptographic Approach -- A Lightweight Secure Communication Protocol for IoT devices using Physically Unclonable Function -- Blockchain-based Mobility Management for LTE and Beyond -- EPT: EDNS Privacy Tunnel for DNS -- Ensuring Data Integrity in Fog Computing Based Healthcare Systems -- Modelling Security Requirements for Software Development with Common Criteria -- Visualization of DNS Tunneling Attacks using Parallel Coordinates Technique -- A Data-Driven Network Intrusion Detection Model based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection -- Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning -- End-to-end Encryption Schemes for Online Social Networks -- Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data -- Paper Document Authentication Using Print-scan Resistant Image Hashing and Public-key Cryptography -- TLShps: SDN-based TLS Handshake Protocol Simplification for IoT -- Data Protection Labware for Secure Mobile Software Development -- Multi-Round Bidding Strategy Based on Game Theory for Crowdsensing Task -- Information Leakage in Wearable Applications -- An Encryption based Approach to Protect Fog Federations from Rogue Nodes -- Python Scrapers for Scraping Cryptomarkets on Tor -- Characteristics of Bitcoin Transactions on Cryptomarkets -- Effectiveness of Machine Learning based Intrusion Detection Systems -- DNS Flood Attack Mitigation Utilizing Hot-lists and Stale Content Updates -- Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking -- Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation industry -- Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching -- Using machine learning to find anomalies in fieldbus network traffic -- Cyber Weapons Storage Mechanisms -- A New Intrusion Detection System Based on Gated Recurrent Unit(GRU) and Genetic Algorithm -- Topic Model Based Android Malware Detection -- A Verifiable Encryption Scheme Supporting Fuzzy Search -- A Verifiable Fully Homomorphic Encryption Scheme -- Secure Communication in UAV Assisted HetNets: A Proposed Model -- Detection of Application-Layer Tunnels with Rules and Machine Learning -- A Study on Anonymous Protocol in a Permission Blockchain with Ensure Privacy for a Member -- Automated Construction of Malware Families -- A Closer Look At Anonymous Proxy Re-encryption Schemes -- Approximate String Matching for DNS Anomaly Detection. |
Record Nr. | UNISA-996466179403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security, Privacy, and Anonymity in Computation, Communication, and Storage : 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14–17, 2019, Proceedings / / edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVI, 506 p. 317 illus., 142 illus. in color.) |
Disciplina | 005.8 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Data protection
Computers Computer organization Artificial intelligence Security Computing Milieux Information Systems and Communication Service Computer Systems Organization and Communication Networks Artificial Intelligence |
ISBN | 3-030-24907-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Protecting Your Smartphone from Theft Using Accelerometer -- Ransomware Attack Protection: A Cryptographic Approach -- A Lightweight Secure Communication Protocol for IoT devices using Physically Unclonable Function -- Blockchain-based Mobility Management for LTE and Beyond -- EPT: EDNS Privacy Tunnel for DNS -- Ensuring Data Integrity in Fog Computing Based Healthcare Systems -- Modelling Security Requirements for Software Development with Common Criteria -- Visualization of DNS Tunneling Attacks using Parallel Coordinates Technique -- A Data-Driven Network Intrusion Detection Model based on Host Clustering and Integrated Learning: A Case Study on Botnet Detection -- Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning -- End-to-end Encryption Schemes for Online Social Networks -- Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data -- Paper Document Authentication Using Print-scan Resistant Image Hashing and Public-key Cryptography -- TLShps: SDN-based TLS Handshake Protocol Simplification for IoT -- Data Protection Labware for Secure Mobile Software Development -- Multi-Round Bidding Strategy Based on Game Theory for Crowdsensing Task -- Information Leakage in Wearable Applications -- An Encryption based Approach to Protect Fog Federations from Rogue Nodes -- Python Scrapers for Scraping Cryptomarkets on Tor -- Characteristics of Bitcoin Transactions on Cryptomarkets -- Effectiveness of Machine Learning based Intrusion Detection Systems -- DNS Flood Attack Mitigation Utilizing Hot-lists and Stale Content Updates -- Attack-Aware Recovery Controller-Switch-Link Cost Minimization Placement Algorithm in Software-Defined Networking -- Challenges and Future Direction of Time-Sensitive Software-Defined Networking (TSSDN) in Automation industry -- Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching -- Using machine learning to find anomalies in fieldbus network traffic -- Cyber Weapons Storage Mechanisms -- A New Intrusion Detection System Based on Gated Recurrent Unit(GRU) and Genetic Algorithm -- Topic Model Based Android Malware Detection -- A Verifiable Encryption Scheme Supporting Fuzzy Search -- A Verifiable Fully Homomorphic Encryption Scheme -- Secure Communication in UAV Assisted HetNets: A Proposed Model -- Detection of Application-Layer Tunnels with Rules and Machine Learning -- A Study on Anonymous Protocol in a Permission Blockchain with Ensure Privacy for a Member -- Automated Construction of Malware Families -- A Closer Look At Anonymous Proxy Re-encryption Schemes -- Approximate String Matching for DNS Anomaly Detection. |
Record Nr. | UNINA-9910349311303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security, Privacy, and Anonymity in Computation, Communication, and Storage : SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14–17, 2019, Proceedings / / edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XV, 332 p. 127 illus., 97 illus. in color.) |
Disciplina |
658.478
005.8 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Data protection
Computer organization Computers Optical data processing Artificial intelligence Security Computer Systems Organization and Communication Networks Information Systems and Communication Service Image Processing and Computer Vision Artificial Intelligence |
ISBN | 3-030-24900-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The 8th International Symposium on Security and Privacy on Internet of Things (SPIoT 2019) -- Robust Hybrid Lightweight Cryptosystem for Protecting IoT Smart Devices -- A Weighted Risk Score Model for IoT Devices -- Connected Vehicles: A Privacy Analysis -- Privacy-Preserving Big Data Analytics: From Theory to Practice -- The 9th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2019) -- A Framework to Identify People in Unstructured Environments Incorporating Biometrics -- Continuous Authentication Using Mouse Clickstream Data Analysis -- Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net -- Cost-Efficient Task Scheduling for Geo-distributed Data Analytics -- Task Scheduling for Streaming Applications in A Cloud-Edge System -- The 5th International Symposium on Sensor-Cloud Systems (SCS 2019) -- Limited Memory Eigenvector Recursive Principal Component Analysis in Sensor-Cloud Based Adaptive Operational Modal Online Identification -- Optimization of Optical Imaging MIMO-OFDM Precoding Matrix -- Data Collection Scheme for Underwater Sensor Cloud System Based on Fog Computing -- A Survey on Fog Computing -- An Approximate Data Collection Algorithm in Space-based Internet of Things -- Outlier Detection of Internet of Vehicles -- Review of Power Spatio-Temporal Big Data Technologies, Applications, and Challenges -- CP-MCNN:Multi-label Chest X-ray Diagnostic based on Con dence Predictor and CNN -- Naive Approach for Bounding Box Annotation and Object Detection towards Smart Retail Systems -- Evaluation of Face Recognition Techniques Based on Symlet 2 Wavelet and Support Vector Machine -- The 11th International Symposium on UbiSafe Computing (UbiSafe 2019) -- An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation -- Lightweight Distributed Attribute Based Keyword Search System for Internet of Things -- Continuous Objects Detection Based on Optimized Greedy Algorithm in IoT Sensing Networks Distributed Service Recommendation -- The 11th International Workshop on Security in e-Science and e-Research (ISSR 2019) -- Software Quality Assurance: Tools & Techniques -- A Campus Carpooling System Based on GPS Trajectories -- The 2019 International Workshop on Cybersecurity Metrics and Risk Modeling (CMRM 2019) -- Web-based Intelligence for IDS -- Predictably Deterrable? The Case of System Trespassers. |
Record Nr. | UNINA-9910349311403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|