top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Frontiers in Cyber Security : Second International Conference, FCS 2019, Xi'an, China, November 15–17, 2019, Proceedings / / edited by Bazhong Shen, Baocang Wang, Jinguang Han, Yong Yu
Frontiers in Cyber Security : Second International Conference, FCS 2019, Xi'an, China, November 15–17, 2019, Proceedings / / edited by Bazhong Shen, Baocang Wang, Jinguang Han, Yong Yu
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVII, 365 p. 116 illus., 45 illus. in color.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer security
Data protection
Software engineering
Application software
Computer communication systems
Systems and Data Security
Security
Software Engineering
Information Systems Applications (incl. Internet)
Computer Communication Networks
ISBN 981-15-0818-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Symmetric Key Cryptography -- Public Key Cryptography -- Post-quantum Cryptography -- Signature -- Attack and Behavior Detection -- Authenticated Key Agreement -- Blockchain -- System and Network Security.
Record Nr. UNINA-9910357848503321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Provable Security [[electronic resource] ] : 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings / / edited by Liqun Chen, Jinguang Han
Provable Security [[electronic resource] ] : 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings / / edited by Liqun Chen, Jinguang Han
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIII, 394 p. 34 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computers and civilization
Application software
Management information systems
Computer science
Algorithms
Cryptology
Systems and Data Security
Computers and Society
Computer Appl. in Administrative Data Processing
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
ISBN 3-319-47422-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attribute/Role-based Cryptography -- Data in Cloud -- Searchable Encryption -- Key Management -- Encryption -- Leakage Analysis -- Homomorphic Encryption.
Record Nr. UNISA-996465299703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Provable Security : 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings / / edited by Liqun Chen, Jinguang Han
Provable Security : 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings / / edited by Liqun Chen, Jinguang Han
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XIII, 394 p. 34 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computers and civilization
Application software
Management information systems
Computer science
Algorithms
Cryptology
Systems and Data Security
Computers and Society
Computer Appl. in Administrative Data Processing
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
ISBN 3-319-47422-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Attribute/Role-based Cryptography -- Data in Cloud -- Searchable Encryption -- Key Management -- Encryption -- Leakage Analysis -- Homomorphic Encryption.
Record Nr. UNINA-9910484650603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Privacy in New Computing Environments : third EAI international conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, proceedings / / Ding Wang, Weizhi Meng, Jinguang Han (editors)
Security and Privacy in New Computing Environments : third EAI international conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, proceedings / / Ding Wang, Weizhi Meng, Jinguang Han (editors)
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (XIII, 462 p. 122 illus., 108 illus. in color.)
Disciplina 004
Collana Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering
Soggetto topico Cloud computing - Security measures
ISBN 3-030-66922-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Security -- A Characterisation of Smart Grid DoS Attacks -- Security and Privacy in 5G Applications: Challenges and Solutions -- Alarm Elements based Adaptive Network Security Situation Prediction Model -- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback -- System Security -- Research on IoT Security Technology and Standardization in the 5G Era -- MIMEC Based Information System Security Situation Assessment Model -- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings -- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain -- Machine Learning -- Research on a Hybrid EMD-SVR Model for Time Series Prediction -- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity -- User Identity Linkage across Social Networks based on Neural Tensor Network -- An Efficient and Privacy-Preserving Physiological Case Classification Scheme for E-healthcare System -- A multi-class detection system for Android malicious Apps based on color image features -- Authentication and Access Control -- PUF-based Two-factor Group Authentication in Smart Home -- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems -- Access Control for Wireless Body Area Networks -- FIDO - that dog won’t hunt -- Blockchain-enabled user authentication in zero trust Internet of Things -- Cloud Security -- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage -- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain -- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data -- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration -- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing -- Cryptography -- Generative image steganography based on digital Cardan Grille -- Pixel Grouping Based Image Hashing for DIBR 3D Image -- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP -- Applied Cryptography -- A Verifiable Combinatorial Auction Scheme with Bidder’s Privacy Protection -- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query -- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User -- A3BAC: Attribute-Based Access Control Model with Anonymous Access -- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid.
Record Nr. UNINA-9910484752803321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Privacy in New Computing Environments : third EAI international conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, proceedings / / Ding Wang, Weizhi Meng, Jinguang Han (editors)
Security and Privacy in New Computing Environments : third EAI international conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, proceedings / / Ding Wang, Weizhi Meng, Jinguang Han (editors)
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (XIII, 462 p. 122 illus., 108 illus. in color.)
Disciplina 004
Collana Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering
Soggetto topico Cloud computing - Security measures
ISBN 3-030-66922-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Security -- A Characterisation of Smart Grid DoS Attacks -- Security and Privacy in 5G Applications: Challenges and Solutions -- Alarm Elements based Adaptive Network Security Situation Prediction Model -- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback -- System Security -- Research on IoT Security Technology and Standardization in the 5G Era -- MIMEC Based Information System Security Situation Assessment Model -- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings -- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain -- Machine Learning -- Research on a Hybrid EMD-SVR Model for Time Series Prediction -- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity -- User Identity Linkage across Social Networks based on Neural Tensor Network -- An Efficient and Privacy-Preserving Physiological Case Classification Scheme for E-healthcare System -- A multi-class detection system for Android malicious Apps based on color image features -- Authentication and Access Control -- PUF-based Two-factor Group Authentication in Smart Home -- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems -- Access Control for Wireless Body Area Networks -- FIDO - that dog won’t hunt -- Blockchain-enabled user authentication in zero trust Internet of Things -- Cloud Security -- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage -- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain -- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data -- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration -- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing -- Cryptography -- Generative image steganography based on digital Cardan Grille -- Pixel Grouping Based Image Hashing for DIBR 3D Image -- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP -- Applied Cryptography -- A Verifiable Combinatorial Auction Scheme with Bidder’s Privacy Protection -- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query -- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User -- A3BAC: Attribute-Based Access Control Model with Anonymous Access -- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid.
Record Nr. UNISA-996464384203316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui