Applications and Techniques in Information Security [[electronic resource] ] : 13th International Conference, ATIS 2022, Manipal, India, December 30–31, 2022, Revised Selected Papers / / edited by Srikanth Prabhu, Shiva Raj Pokhrel, Gang Li |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (311 pages) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data protection
Artificial intelligence Computer networks Education—Data processing Computer engineering Data and Information Security Artificial Intelligence Computer Communication Networks Computers and Education Computer Engineering and Networks |
Soggetto non controllato |
Computer Security
Computers |
ISBN | 981-9922-64-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Privacy and Security -- Reinforcement Technique for Classifying Quasi and Non-Quasi Attributes for Privacy Preservation and Data Protection -- Non-malleable Codes from Authenticated Encryption in Split-State Model -- Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model -- Deep Learning based Differential Classifier of PRIDE and RC5 -- A Better MixColumns Matrix to AES Against Differential Fault Analysis Attack -- Variants of Crypto-Jacking Attacks and their detection techniques -- Comparative Study of Sentiment Analysis on Cyber Security Related Multi-Sourced Data in Social Media Platforms -- Modified Blowfish Encryption Algorithm for Wireless Body Area Network -- EyeEncrypt: A Cyber-Secured Framework for Retinal Image Segmentation -- Cosine Similarity based Group Movie Recommendation Scheme considering Privacy of Users -- Enhancing Face Recognition Accuracy using the ED-FFP Extraction Method and Ensemble Learning for Forensics and Cyber Security -- Intrusion Detection Using Federated Learning -- Advances in Machine Learning -- A Comparative Analysis of Classification Algorithms used for predicting Parkinson’s Disease -- Optimization of Cluster based Charging dynamics and routing of EV using Deep RNN -- Analysis and Prognosis of Water Quality for River Ganga using Water Quality Index -- Detection of Android Ransomware using Machine Learning Approach -- Cyber Security and Layering of Medical Data Using Machine Learning Algorithms -- Analysis on Classification of Handwritten Devanagari Characters using Deep Learning Models -- Cloud, IoT and Computing Technologies -- Analysis and Comparison of Different Frontend Frameworks -- Lightweight Capability-Based Access control for Internet of Things (IoT) -- Securing IoT using blockchain -- Vikas: A Multimodal framework to Aid in Effective Disaster Management -- Discovery of Rare Itemsets using Hyper-Linked Data Structure: A Parallel Approach. |
Record Nr. | UNISA-996546832503316 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applications and Techniques in Information Security : 13th International Conference, ATIS 2022, Manipal, India, December 30–31, 2022, Revised Selected Papers / / edited by Srikanth Prabhu, Shiva Raj Pokhrel, Gang Li |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (311 pages) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data protection
Artificial intelligence Computer networks Education—Data processing Computer engineering Data and Information Security Artificial Intelligence Computer Communication Networks Computers and Education Computer Engineering and Networks |
Soggetto non controllato |
Computer Security
Computers |
ISBN | 981-9922-64-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Privacy and Security -- Reinforcement Technique for Classifying Quasi and Non-Quasi Attributes for Privacy Preservation and Data Protection -- Non-malleable Codes from Authenticated Encryption in Split-State Model -- Continuously Non-Malleable Codes from Authenticated Encryptions in 2-Split-State Model -- Deep Learning based Differential Classifier of PRIDE and RC5 -- A Better MixColumns Matrix to AES Against Differential Fault Analysis Attack -- Variants of Crypto-Jacking Attacks and their detection techniques -- Comparative Study of Sentiment Analysis on Cyber Security Related Multi-Sourced Data in Social Media Platforms -- Modified Blowfish Encryption Algorithm for Wireless Body Area Network -- EyeEncrypt: A Cyber-Secured Framework for Retinal Image Segmentation -- Cosine Similarity based Group Movie Recommendation Scheme considering Privacy of Users -- Enhancing Face Recognition Accuracy using the ED-FFP Extraction Method and Ensemble Learning for Forensics and Cyber Security -- Intrusion Detection Using Federated Learning -- Advances in Machine Learning -- A Comparative Analysis of Classification Algorithms used for predicting Parkinson’s Disease -- Optimization of Cluster based Charging dynamics and routing of EV using Deep RNN -- Analysis and Prognosis of Water Quality for River Ganga using Water Quality Index -- Detection of Android Ransomware using Machine Learning Approach -- Cyber Security and Layering of Medical Data Using Machine Learning Algorithms -- Analysis on Classification of Handwritten Devanagari Characters using Deep Learning Models -- Cloud, IoT and Computing Technologies -- Analysis and Comparison of Different Frontend Frameworks -- Lightweight Capability-Based Access control for Internet of Things (IoT) -- Securing IoT using blockchain -- Vikas: A Multimodal framework to Aid in Effective Disaster Management -- Discovery of Rare Itemsets using Hyper-Linked Data Structure: A Parallel Approach. |
Record Nr. | UNINA-9910726296103321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Applications and techniques in information security : 11th international conference, atis 2020, brisbane, qld, australia, november 12-13, 2020, proceedings / / edited by Lejla Batina, Gang Li |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (IX, 123 p. 33 illus., 21 illus. in color.) |
Disciplina | 929.605 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer networks - Security measures
Computer security |
ISBN | 981-334-706-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Framework for Evaluation of Software Obfuscation Tools for Embedded Devices -- Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme -- Digital Forensics for Drones: A Study of Tools and Techniques -- Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output -- A New Rabin-type Cryptosystem with Modulus P^2q -- Malware Analysis Method Based Random Access Memory in Android -- Vulnerability Database as a Service for IoT -- Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher. . |
Record Nr. | UNISA-996465452603316 |
Singapore : , : Springer, , [2020] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applications and techniques in information security : 11th international conference, atis 2020, brisbane, qld, australia, november 12-13, 2020, proceedings / / edited by Lejla Batina, Gang Li |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (IX, 123 p. 33 illus., 21 illus. in color.) |
Disciplina | 929.605 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer networks - Security measures
Computer security |
ISBN | 981-334-706-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Framework for Evaluation of Software Obfuscation Tools for Embedded Devices -- Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme -- Digital Forensics for Drones: A Study of Tools and Techniques -- Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output -- A New Rabin-type Cryptosystem with Modulus P^2q -- Malware Analysis Method Based Random Access Memory in Android -- Vulnerability Database as a Service for IoT -- Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher. . |
Record Nr. | UNINA-9910427694603321 |
Singapore : , : Springer, , [2020] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Applications and Techniques in Information Security : 10th International Conference, ATIS 2019, Thanjavur, India, November 22–24, 2019, Proceedings / / edited by V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, Leo Zhang, Lynn Batten, Gang Li |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XI, 313 p. 157 illus., 101 illus. in color.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data protection
Computers—Law and legislation Information technology—Law and legislation Artificial intelligence Application software Computer networks Data and Information Security Legal Aspects of Computing Artificial Intelligence Computer and Information Systems Applications Computer Communication Networks |
ISBN | 981-15-0871-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Information Security -- Network Security -- Intrusion Detection System -- Authentication and Key Management System -- Security Centric Applications. . |
Record Nr. | UNINA-9910357850203321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Applications and Techniques in Information Security : 9th International Conference, ATIS 2018, Nanning, China, November 9–11, 2018, Proceedings / / edited by Qingfeng Chen, Jia Wu, Shichao Zhang, Changan Yuan, Lynn Batten, Gang Li |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XII, 223 p. 65 illus.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Data mining Artificial intelligence Data encryption (Computer science) Systems and Data Security Data Mining and Knowledge Discovery Artificial Intelligence Cryptology |
ISBN | 981-13-2907-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Information Security -- Information Abuse Prevention -- Security Implementations -- Knowledge Discovery -- Applications. |
Record Nr. | UNINA-9910299295503321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2018 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Applications and Techniques in Information Security : 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6–7, 2017, Proceedings / / edited by Lynn Batten, Dong Seong Kim, Xuyun Zhang, Gang Li |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIV, 223 p. 68 illus.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Data encryption (Computer science) Algorithms Systems and Data Security Cryptology Algorithm Analysis and Problem Complexity |
ISBN | 981-10-5421-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Speeches -- Crypto Algorithms and Applications -- Attacks -- Malware and Malicious Events Detection -- System and Network Security. |
Record Nr. | UNINA-9910254820103321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Applications and Techniques in Information Security : 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, Proceedings / / edited by Lynn Batten, Gang Li |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XVI, 163 p. 30 illus.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Data encryption (Computer science) Algorithms Systems and Data Security Cryptology Algorithm Analysis and Problem Complexity |
ISBN | 981-10-2741-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited speeches -- Attacks on data security systems -- Detection of attacks on data security systems -- Data security -- Data privacy. |
Record Nr. | UNINA-9910254987403321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Applications and Techniques in Information Security : 6th International Conference, ATIS 2015, Beijing, China, November 4-6, 2015, Proceedings / / edited by Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XVII, 398 p. 147 illus. in color.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Data encryption (Computer science) Algorithms Systems and Data Security Cryptology Algorithm Analysis and Problem Complexity |
ISBN | 3-662-48683-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Invited Speeches -- Memory Scrapper Attacks - Threats and Mitigations -- A Simple and Provable Secure (Authenticated) Key Exchange Based on LWE -- Contents -- Cryptograph -- An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map -- Abstract -- 1 Introduction -- 2 Basic Theory of the Proposed Algorithm -- 2.1 Zigzag Transformation -- 2.2 3-Dimension Logistic Chaotic Map -- 3 Algorithm Described -- 4 Simulation Result -- 5 The Security Analysis -- 5.1 Resistance to Exhaustive Attack -- 5.1.1 Analysis of Key Space -- 5.1.2 Keys' Sensitivity Analysis -- 5.2 Resistance to Statistical Attack -- 5.2.1 The Grey Histogram Analysis -- 5.2.2 Correlation Coefficient Analysis -- 5.3 Information Entropy Analysis -- 5.4 Compare the Efficiency of Encryption and Decryption -- 6 Conclusion -- Acknowledgements -- References -- An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme -- 1 Introduction -- 2 Preliminaries -- 3 Security Analysis of Liang et al.'s CR-IB-PRE Scheme -- 4 Syntax and Security Definition for CR-IB-PRE Scheme -- 5 Our Improved CR-IB-PRE Scheme -- 6 Security and Efficiency Analysis -- 7 Conclusion -- References -- Cryptographic Public Key Length Prediction -- Abstract -- 1 Introduction -- 2 Key Length Prediction -- 2.1 Lenstra and Verheul Equations -- 2.2 Lenstra Update Equations -- 2.3 The Network Working Group RFC3766 -- 2.4 ECRYPT and ECRYPT II -- 2.5 Nist -- 2.6 Anssi -- 2.7 BSI -- 3 Moore's Law -- 4 Experiments and Environment -- 5 Summary and Conclusions -- References -- An Image Encryption Algorithm Based on Chua's Chaos and Baker's Transformation -- 1 Introduction -- 2 Chaos Theory -- 3 Baker's Transformation -- 4 Encryption Methodology -- 5 Experimental Results and Analysis -- 5.1 Experimental Results -- 5.2 Experimental Analysis.
6 Conclusion -- References -- Quantum Differential Cryptanalysis to the Block Ciphers -- 1 Introduction -- 2 Preliminaries -- 2.1 Classical Differential Cryptanalysis -- 2.2 The Bernstein--Vazirani Algorithm -- 2.3 Results After Running the Bernstein--Vazirani Algorithm -- 3 Quantum Algorithm to Execute Differential Cryptanalysis -- 3.1 The First Method -- 3.2 The Second Method -- 4 Discussions and Conclusions -- References -- An Enhanced Authentication Scheme for Virtual Private Network Access Based on Platform Attributes o ... -- Abstract -- 1 Introduction -- 2 Preliminaries -- 2.1 VPN -- 2.2 Platform Security Attributes -- 2.3 Attribute Based Encryption -- 3 Problem Definition -- 3.1 Our Goals -- 3.2 Threat Model and Assumptions -- 4 Design -- 4.1 Authentication Scheme Overview -- 4.2 Platform Attributes Extraction -- 4.3 Security Requirements Classification -- 5 Implementation -- 5.1 Platform Attributes Expression -- 5.2 Remote Authentication Framework -- 5.3 ABE Based Authentication -- 5.4 Trusted Computing Based Attributes -- 6 Analysis -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 7 Conclusion -- References -- Public Key Timed-Release Attribute-Based Encryption -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Related Work -- 1.3 Organization -- 2 Preliminaries -- 2.1 Bilinear Maps -- 2.2 Complexity Assumptions -- 3 PKTRABE: Definitions -- 4 Construction 1: Single Time Server -- 4.1 Description of the Scheme -- 4.2 Security of the Scheme -- 5 Construction 2: Multiple Time Servers -- 5.1 Description of the Scheme -- 5.2 Security of the Scheme -- 6 Conclusions and Future Work -- References -- Color Image Encryption in CIE L*a*b* Space -- 1 Introduction -- 2 Previous Work -- 3 Preliminaries -- 3.1 1D Logistic Map -- 3.2 2D Arnold's Cat Map -- 3.3 3D Lu Map -- 4 Color Image Encryption in L*a*b* -- 4.1 Color Conversion. 4.2 The L* Channel -- 4.3 The A* and B* Channel -- 5 Simulation Results -- 6 Security and Performance Analysis -- 6.1 Resistance to the Brute-Force Attack -- 6.2 Resistance to the Statistic Attack -- 6.3 The Speed of the Encryption and Decryption -- 7 Conclusion and Discussion -- References -- Evaluation, Standards and Protocols -- Discover Abnormal Behaviors Using HTTP Header Fields Measurement -- Abstract -- 1 Introduction -- 2 Related Work -- 2.1 Discovery of Abnormal Behaviors -- 2.2 Automatic Discovery of Protocol Format -- 3 Methodology -- 4 Experiments and Results -- 4.1 Environment -- 4.2 The Basic Statistical Analysis of HTTP Header Field -- 4.3 The Mining Analysis of HTTP Header Field Order -- 4.4 Recognize Abnormal HTTP Flow -- 5 Conclusions -- Acknowledgements -- References -- Reconstruction of Potential Attack Scenarios of the OpenID Protocol Towards Network Forensics Analysis -- 1 Introduction -- 2 Overview of the OpenID Protocol -- 3 Modeling Protocols in TLA+ -- 3.1 General Flow -- 3.2 Protocol Specification -- 4 Experimental Results and Discussion -- 5 Defense Mechanisms -- 6 Conclusion -- References -- A Lightweight Code-Based Authentication Protocol for RFID Systems -- 1 Introduction -- 2 Related Work -- 3 Error Correction Code (ECC) -- 4 Our Proposed Protocol -- 4.1 QC-MDPC McEliece Encryption -- 4.2 Initialization -- 4.3 Authentication -- 5 Security Analysis -- 6 Performance Analysis -- 7 Conclusion -- References -- An Overview of Ad Hoc Network Security -- Abstract -- 1 Introduction -- 2 Existing Typical Schemes -- 2.1 Threshold Mechanism Schemes -- 2.2 Self-organized Mechanism Schemes -- 2.3 Id-Based Mechanism Schemes -- 2.4 Cluster-Based Mechanism Schemes -- 3 The Comparisons of Those Schemes -- 4 Further Study -- 4.1 A Bi-directional Trust Model -- 4.2 A Trust Model with Parameter -- 5 Conclusions -- References. Trust Computing and Privacy Protection -- Structural Analysis of IWA Social Network -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Our Approach -- 3.1 Basic Concept of IWA Social Network -- 3.2 IWA Social Network Construction -- 3.3 Community Detection Algorithm -- 4 Experiment -- 4.1 Data Setting -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- References -- A Differentially Private Method for Reward-Based Spatial Crowdsourcing -- 1 Introduction -- 2 Related Work and Background -- 2.1 Related Work -- 2.2 Differential Privacy -- 3 Differentially Private Method -- 3.1 Problem Definition -- 3.2 Building Contour Plot with DP -- 3.3 Task Assignment -- 4 Experiments -- 4.1 Settings -- 4.2 Experiment Results and Comparisons -- 5 Conclusions -- References -- Do Applications Perform Its Original Design? A Preliminary Analysis from Internet Big Data -- Abstract -- 1 Introduction and Motivations -- 2 Measurement Methodology -- 2.1 Overview of Data Sets -- 2.2 Measurement Metrics -- 2.3 Measurement Framework -- 3 Measurement Result -- 3.1 HTTP and HTTPS Performance -- 3.2 FTP Performance -- 3.3 SSH Performance -- 3.4 SMTP Performance -- 4 Conclusion and Future Works -- References -- Trust Prediction with Trust Antecedent Framework Regularization -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Matrix Factorization Model for Trust Prediction -- 4 Modeling Trust Antecedent Framework for Trust Prediction -- 4.1 Factors of Perceived Trustworthiness -- 4.2 The Proposed Framework: tafTrust -- 5 Experiments -- 5.1 Dataset -- 5.2 Evaluation Metrics -- 5.3 Comparison Methods and Details -- 5.4 Impact of Parameter gamma -- 6 Conclusion and Future Work -- Acknowledgments -- References -- Trust Prediction Based on Interactive Relations Strength -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Trust Prediction Framework. 3.1 Modeling Relational Strength in Fields -- 3.2 Trust Prediction Model -- 4 Experiments and Evaluation -- 4.1 Dataset and Evaluation Method -- 4.2 Comparison of Different Trust Predictors -- 5 Conclusions -- Acknowledgments -- References -- Cloud Security and Applications -- You Can't Hide: A Novel Methodology to Defend DDoS Attack Based on Botcloud -- Abstract -- 1 Introduction -- 2 Related Works -- 3 A Novel Methodology of Defending DDoS Attack Based on Botcloud -- 3.1 Identifying Attack Flows -- 3.2 Tracebacking Malicious Processes -- 4 Experiments and Analysis -- 4.1 Experimental Setting -- 4.2 Experimental Results and Analysis -- 5 Conclusion and Future Works -- References -- Quantitative Evaluation Method of Cloud Security -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Cloud Security Indicator System -- 3.1 Principles of Building of Indicator System -- 3.2 Architecture of the Indicator System -- 4 Quantitative Assessment of Cloud Security -- 4.1 Multi-attribute Decision Making Indicator System -- 4.2 Normalization of Decision-Making Index -- 4.3 Multi-attribute Decision-Making -- 5 Example of Quantitative Analysis -- 5.1 Security Evaluation Module -- 5.2 Quantization Evaluation -- 6 Summary -- References -- A Large-Scale Distributed Sorting Algorithm Based on Cloud Computing -- Abstract -- 1 Introduction -- 2 Construction of Large-Scale Distributed Sorting Platform -- 2.1 Business Logic Design -- 2.1.1 Business Logic Design of Host -- 2.1.2 Business Logic Design of Working Machine -- 3 Large-Scale Distributed Sorting Algorithm Design -- 3.1 Large-Scale Distributed Sorting Algorithm Design of Host -- 3.1.1 Data Distribution Based on Constraint of the Number of Working Machine -- 3.1.2 Task Distribution Based on Constraint of Free Time -- 3.2 Large-Scale Distributed Sorting Algorithm Design of Working Machine. 4 Implementation and Validation of Algorithm. |
Record Nr. | UNINA-9910298961303321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Applications and Techniques in Information Security : International Conference, ATIS 2014, Melbourne, Australia, November 26-28, 2014. Proceedings / / edited by Lynn Batten, Gang Li, Wenjia Niu, Matthew Warren |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XII, 266 p. 120 illus.) |
Disciplina | 005.8 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer security
Data encryption (Computer science) Systems and Data Security Cryptology |
ISBN | 3-662-45670-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Applications -- Curbing cyber crimes -- Data privacy -- Digital forensics -- Security implementations. |
Record Nr. | UNINA-9910298977603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|