Cloud Computing, Security, Privacy in New Computing Environments : 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings / / edited by Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, Xiaofeng Liao, Jiwu Huang, Zheli Liu
| Cloud Computing, Security, Privacy in New Computing Environments : 7th International Conference, CloudComp 2016, and First International Conference, SPNCE 2016, Guangzhou, China, November 25–26, and December 15–16, 2016, Proceedings / / edited by Jiafu Wan, Kai Lin, Delu Zeng, Jin Li, Yang Xiang, Xiaofeng Liao, Jiwu Huang, Zheli Liu |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
| Descrizione fisica | 1 online resource (XIV, 240 p. 61 illus.) |
| Disciplina | 004.6782 |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico |
Computer networks
Application software Computer security Data encryption (Computer science) Data protection Artificial intelligence Computer Communication Networks Information Systems Applications (incl. Internet) Systems and Data Security Cryptology Security Artificial Intelligence |
| ISBN | 3-319-69605-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Software Defined Network Routing in Wireless Sensor Network -- Efficient Graph Mining on Heterogeneous Platforms in the Cloud -- Correlation-Aware Virtual Machine Placement in Data Center Networks -- Connectivity-Aware Virtual Machine Placement in 60GHz Wireless Cloud Center -- Ethical Trust in Cloud Computing Using Fuzzy Logic -- Answer Ranking by Analyzing Characteristic of Tags and Behaviors of Users -- Mobile Cloud Platform: Architecture Deployment and Big Data Applications -- Research on Algorithm and Model of Hand Gestures Recognition Based on HMM -- Question Recommendation Based on User Model in CQA -- Data Storage Protection of Community Medical Internet of Things -- Generalized Format-preserving Encryption for Character Data -- Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System -- Ring Signature Scheme from Multilinear Maps in the Standard Model -- A Revocable Outsourcing Attribute-based Encryption Scheme -- Operational-behavior Auditing in Cloud Storage -- Efficient Verifiable Multi-user Searchable Symmetric Encryption for Encrypted Data in the Cloud -- Secure Searchable Public-Key Encryption for Cloud Storage -- Adaptive Algorithm Based on Reversible Data Hiding Method for JPEG Images -- Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks -- DMSD-FPE: Data masking system for database based on format-preserving encryption -- Delay-tolerant Network Based Secure Transmission System Design -- An Internal Waves Detection Method Based on PCANet for Images Captured from UAV. . |
| Record Nr. | UNINA-9910299289503321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Information and Communications Security [[electronic resource] ] : 25th International Conference, ICICS 2023, Tianjin, China, November 18–20, 2023, Proceedings / / edited by Ding Wang, Moti Yung, Zheli Liu, Xiaofeng Chen
| Information and Communications Security [[electronic resource] ] : 25th International Conference, ICICS 2023, Tianjin, China, November 18–20, 2023, Proceedings / / edited by Ding Wang, Moti Yung, Zheli Liu, Xiaofeng Chen |
| Autore | Wang Ding |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (773 pages) |
| Disciplina |
005.73
003.54 |
| Altri autori (Persone) |
YungMoti
LiuZheli ChenXiaofeng |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data structures (Computer science)
Information theory Database management Data mining Application software Image processing - Digital techniques Computer vision Cryptography Data encryption (Computer science) Data Structures and Information Theory Database Management Data Mining and Knowledge Discovery Computer and Information Systems Applications Computer Imaging, Vision, Pattern Recognition and Graphics Cryptology |
| ISBN | 981-9973-56-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Symmetric-Key Cryptography -- SAT-aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA -- Improved Related-Key Rectangle Attack against the Full AES-192 -- Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM -- Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher -- PAE: Towards More Efficient and BBB-secure AE From a Single Public Permutation -- Public-Key Cryptography -- A Polynomial-time Attack on G2SIDH -- Improvements of Homomorphic Secure Evaluation of Inverse Square Root -- Oblivious Transfer from Rerandomizable PKE -- Forward Secure Lattice-based Ring Signature Scheme in the Standard Model -- Applied Cryptography -- Secure Multi-Party Computation with Legally-Enforceable Fairness -- On-demand Allocation of Cryptographic Computing Resource with Load Prediction -- Private Message Franking with After Opening Privacy -- Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction -- Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography -- Authentication and Authorization -- PiXi: Password Inspiration by Exploring Information -- Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris Verification -- A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things -- BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks -- Privacy and Anonymity -- Link Prediction-Based Multi-Identity Recognition of Darknet Vendors -- CryptoMask: Privacy-preserving Face Recognition -- Efficient Private Multiset ID Protocols -- Zoomer: A Website Fingerprinting Attack against Tor Hidden Services -- An Enhanced Privacy-preserving Hierarchical Federated Learning Framework for IoV -- Security and Privacy of AI -- Revisiting the Deep Learning-based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors -- Multi-scale Features Destructive Universal Adversarial Perturbations -- Pixel-Wise Reconstruction of Private Data in Split Federated Learning -- Neural Network Backdoor Attacks Fully Controlled by Composite Natural Utterance Fragments -- Black-Box Fairness Testing with Shadow Models -- Graph Unlearning using Knowledge Distillation -- AFLOW: Developing Adversarial Examples under Extremely Noise-limited Settings -- Learning to Detect Deepfakes via Adaptive Attention and Constrained Difference -- A Novel Deep Ensemble Framework for Online Signature Verification Using Temporal and Spatial Representation -- Blockchain and Cryptocurrencies -- SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains -- Subsidy Bridge: Rewarding Cross-blockchain Relayers with Subsidy -- Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-based Cryptocurrency Transactions -- Blockchain based Publicly Auditable Multi-Party Computation with Cheater Detection -- BDTS: Blockchain-based Data Trading System -- Illegal Accounts Detection on Ethereum using Heterogeneous Graph Transformer Networks -- System and Network security -- DRoT: A Decentralised Root of Trust for Trusted Networks -- Finding Missing Security Operation Bugs via Program Slicing and Differential Check -- TimeClave: Oblivious In-enclave Time series Processing System -- Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios -- A Fake News Detection Method Based on A Multimodal Cooperative Attention Network. |
| Record Nr. | UNISA-996558467003316 |
Wang Ding
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information and Communications Security : 25th International Conference, ICICS 2023, Tianjin, China, November 18–20, 2023, Proceedings / / edited by Ding Wang, Moti Yung, Zheli Liu, Xiaofeng Chen
| Information and Communications Security : 25th International Conference, ICICS 2023, Tianjin, China, November 18–20, 2023, Proceedings / / edited by Ding Wang, Moti Yung, Zheli Liu, Xiaofeng Chen |
| Autore | Wang Ding |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (773 pages) |
| Disciplina |
005.73
003.54 |
| Altri autori (Persone) |
YungMoti
LiuZheli ChenXiaofeng |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data structures (Computer science)
Information theory Database management Data mining Application software Image processing - Digital techniques Computer vision Cryptography Data encryption (Computer science) Data Structures and Information Theory Database Management Data Mining and Knowledge Discovery Computer and Information Systems Applications Computer Imaging, Vision, Pattern Recognition and Graphics Cryptology |
| ISBN |
9789819973569
9819973562 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Symmetric-Key Cryptography -- SAT-aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA -- Improved Related-Key Rectangle Attack against the Full AES-192 -- Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM -- Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher -- PAE: Towards More Efficient and BBB-secure AE From a Single Public Permutation -- Public-Key Cryptography -- A Polynomial-time Attack on G2SIDH -- Improvements of Homomorphic Secure Evaluation of Inverse Square Root -- Oblivious Transfer from Rerandomizable PKE -- Forward Secure Lattice-based Ring Signature Scheme in the Standard Model -- Applied Cryptography -- Secure Multi-Party Computation with Legally-Enforceable Fairness -- On-demand Allocation of Cryptographic Computing Resource with Load Prediction -- Private Message Franking with After Opening Privacy -- Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction -- Outsourcing Verifiable Distributed Oblivious Polynomial Evaluation from Threshold Cryptography -- Authentication and Authorization -- PiXi: Password Inspiration by Exploring Information -- Security Analysis of Alignment-Robust Cancelable Biometric Scheme for Iris Verification -- A Certificateless Conditional Anonymous Authentication Scheme for Satellite Internet of Things -- BLAC: A Blockchain-based Lightweight Access Control Scheme in Vehicular Social Networks -- Privacy and Anonymity -- Link Prediction-Based Multi-Identity Recognition of Darknet Vendors -- CryptoMask: Privacy-preserving Face Recognition -- Efficient Private Multiset ID Protocols -- Zoomer: A Website Fingerprinting Attack against Tor Hidden Services -- An Enhanced Privacy-preserving Hierarchical Federated Learning Framework for IoV -- Security and Privacy of AI -- Revisiting the Deep Learning-based Eavesdropping Attacks via Facial Dynamics from VR Motion Sensors -- Multi-scale Features Destructive Universal Adversarial Perturbations -- Pixel-Wise Reconstruction of Private Data in Split Federated Learning -- Neural Network Backdoor Attacks Fully Controlled by Composite Natural Utterance Fragments -- Black-Box Fairness Testing with Shadow Models -- Graph Unlearning using Knowledge Distillation -- AFLOW: Developing Adversarial Examples under Extremely Noise-limited Settings -- Learning to Detect Deepfakes via Adaptive Attention and Constrained Difference -- A Novel Deep Ensemble Framework for Online Signature Verification Using Temporal and Spatial Representation -- Blockchain and Cryptocurrencies -- SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains -- Subsidy Bridge: Rewarding Cross-blockchain Relayers with Subsidy -- Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-based Cryptocurrency Transactions -- Blockchain based Publicly Auditable Multi-Party Computation with Cheater Detection -- BDTS: Blockchain-based Data Trading System -- Illegal Accounts Detection on Ethereum using Heterogeneous Graph Transformer Networks -- System and Network security -- DRoT: A Decentralised Root of Trust for Trusted Networks -- Finding Missing Security Operation Bugs via Program Slicing and Differential Check -- TimeClave: Oblivious In-enclave Time series Processing System -- Efficient and Appropriate Key Generation Scheme in Different IoT Scenarios -- A Fake News Detection Method Based on A Multimodal Cooperative Attention Network. |
| Record Nr. | UNINA-9910754093503321 |
Wang Ding
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Privacy-Preserving Machine Learning / / by Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li
| Privacy-Preserving Machine Learning / / by Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li |
| Autore | Li Jin |
| Edizione | [1st ed. 2022.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022 |
| Descrizione fisica | 1 online resource (VIII, 88 p. 21 illus., 18 illus. in color.) |
| Disciplina |
005.8
323.448 |
| Collana | SpringerBriefs on Cyber Security Systems and Networks |
| Soggetto topico |
Data protection - Law and legislation
Machine learning Privacy Machine Learning Aprenentatge automàtic Seguretat informàtica Protecció de dades |
| Soggetto genere / forma | Llibres electrònics |
| ISBN |
9789811691393
9811691398 9789811691386 981169138X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction -- Secure Cooperative Learning in Early Years -- Outsourced Computation for Learning -- Secure Distributed Learning -- Learning with Differential Privacy -- Applications - Privacy-Preserving Image Processing -- Threats in Open Environment -- Conclusion. |
| Record Nr. | UNINA-9910993945703321 |
Li Jin
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security and Privacy in New Computing Environments : Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings / / edited by Jin Li, Zheli Liu, Hao Peng
| Security and Privacy in New Computing Environments : Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings / / edited by Jin Li, Zheli Liu, Hao Peng |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (XIV, 745 p. 287 illus., 180 illus. in color.) |
| Disciplina |
004.6782
005.8 |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico |
Computer security
Computer networks Computers Systems and Data Security Computer Communication Networks Information Systems and Communication Service |
| ISBN | 3-030-21373-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Privacy and security analysis -- internet of things -- cloud computing -- system building, scheme, model and application for data -- mechanism and method in new computing. |
| Record Nr. | UNINA-9910337845603321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security and privacy in social networks and big data : 6th International Symposium, SocialSec 2020, Tianjin, China, September 26-27, 2020, Proceedings / / Yang Xiang, Zheli Liu, Jin Li, editors
| Security and privacy in social networks and big data : 6th International Symposium, SocialSec 2020, Tianjin, China, September 26-27, 2020, Proceedings / / Yang Xiang, Zheli Liu, Jin Li, editors |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Gateway East, Singapore : , : Springer, , [2020] |
| Descrizione fisica | 1 online resource (XII, 448 p. 186 illus., 102 illus. in color.) |
| Disciplina | 005.82 |
| Collana | Communications in computer and information science |
| Soggetto topico | Data encryption (Computer science) |
| ISBN | 981-15-9031-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Big Data Security -- Social Networks -- Privacy-preserving and Security. |
| Record Nr. | UNISA-996465360203316 |
| Gateway East, Singapore : , : Springer, , [2020] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Security and Privacy in Social Networks and Big Data : 6th International Symposium, SocialSec 2020, Tianjin, China, September 26–27, 2020, Proceedings / / edited by Yang Xiang, Zheli Liu, Jin Li
| Security and Privacy in Social Networks and Big Data : 6th International Symposium, SocialSec 2020, Tianjin, China, September 26–27, 2020, Proceedings / / edited by Yang Xiang, Zheli Liu, Jin Li |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XII, 448 p. 186 illus., 102 illus. in color.) |
| Disciplina | 005.82 |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Computer networks - Security measures
Application software Computer networks Computers Cryptography Data encryption (Computer science) Data protection Mobile and Network Security Computer and Information Systems Applications Computer Communication Networks Computing Milieux Cryptology Data and Information Security |
| ISBN | 981-15-9031-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Big Data Security -- Social Networks -- Privacy-preserving and Security. |
| Record Nr. | UNINA-9910427712303321 |
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||