top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
ASSS '21 : proceedings of the 2021 International Symposium on Advanced Security on Software and Systems : June 7, 2021, Virtual Event, Hong Kong / / Weizhi Meng, Li Li
ASSS '21 : proceedings of the 2021 International Symposium on Advanced Security on Software and Systems : June 7, 2021, Virtual Event, Hong Kong / / Weizhi Meng, Li Li
Autore Meng Weizhi
Pubbl/distr/stampa New York, New York : , : Association for Computing Machinery, , 2021
Descrizione fisica 1 online resource (62 pages) : illustrations
Disciplina 005.8
Soggetto topico Computer security
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910510453103321
Meng Weizhi  
New York, New York : , : Association for Computing Machinery, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Practice and Experience [[electronic resource] ] : 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings / / edited by Weizhi Meng, Zheng Yan, Vincenzo Piuri
Information Security Practice and Experience [[electronic resource] ] : 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings / / edited by Weizhi Meng, Zheng Yan, Vincenzo Piuri
Autore Meng Weizhi
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (628 pages)
Disciplina 005.8
Altri autori (Persone) YanZheng
PiuriVincenzo
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer networks
Computer systems
Application software
Computers
Security Services
Computer Communication Networks
Computer System Implementation
Computer and Information Systems Applications
Computing Milieux
Data and Information Security
ISBN 981-9970-32-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion Recognition -- FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems using Autoencoder-based Latent Space Representations -- Mitigating Sybil Attacks in Federated Learning -- Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics -- Obfuscation padding schemes that minimize Renyi min-entropy for Privacy -- Cross-border Data Security from the Perspective of Risk Assessment -- IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures -- CVAR-FL IoV Intrusion Detection Framework -- Transparent Security Method for Automating IoT Security Assessments -- DIDO: Data Provenance from Restricted TLS 1.3 Websites -- QR-SACP: Quantitative Risk-based Situational Awareness Calculation and Projection through Threat Information Sharing -- Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G -- RTR-Shield: Early Detection of Ransomware using Registry and Trap Files -- MalXCap: A Method for Malware Capability Extraction -- Multimodal Software bug Severity Prediction Based on Sentiment Probability -- Recovering Multi-Prime RSA Keys with Erasures and Errors -- Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example -- Chosen Ciphertext Security for Blind Identity-based Encryption with Certified Identities -- A New Gadget Decomposition Algorithm with Less Noise Growth in HE schemes -- Malicious Player Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations -- Cryptanalysis of Human Identification Protocol with Human-Computable Passwords -- A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS) -- A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability -- LocKey: Location-based Key Extraction from the WiFi Environment in the User’s Vicinity -- BAHS: a Blockchain-Aided Hash-based Signature Scheme -- Lever: Making Intensive Validation Practical on Blockchain -- Tikuna: An Ethereum Blockchain Network Security Monitoring System -- Isogeny-based Multi-Signature Scheme -- Security Analysis of WAGE against Division Property based Cube Attack -- When MPC in the Head meets VC -- Quantum Key Distribution as a Service and Its Injection into TLS -- XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph -- XSS attack detection by attention mechanism based on script tags in URLs -- Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning -- SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain.
Record Nr. UNINA-9910760264603321
Meng Weizhi  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security Practice and Experience [[electronic resource] ] : 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings / / edited by Weizhi Meng, Zheng Yan, Vincenzo Piuri
Information Security Practice and Experience [[electronic resource] ] : 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings / / edited by Weizhi Meng, Zheng Yan, Vincenzo Piuri
Autore Meng Weizhi
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (628 pages)
Disciplina 005.8
Altri autori (Persone) YanZheng
PiuriVincenzo
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Computer networks
Computer systems
Application software
Computers
Security Services
Computer Communication Networks
Computer System Implementation
Computer and Information Systems Applications
Computing Milieux
Data and Information Security
ISBN 981-9970-32-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure and Efficient Federated Learning by Combining Homomorphic Encryption and Gradient Pruning in Speech Emotion Recognition -- FedLS: An Anti-poisoning Attack Mechanism for Federated Network Intrusion Detection Systems using Autoencoder-based Latent Space Representations -- Mitigating Sybil Attacks in Federated Learning -- Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics -- Obfuscation padding schemes that minimize Renyi min-entropy for Privacy -- Cross-border Data Security from the Perspective of Risk Assessment -- IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures -- CVAR-FL IoV Intrusion Detection Framework -- Transparent Security Method for Automating IoT Security Assessments -- DIDO: Data Provenance from Restricted TLS 1.3 Websites -- QR-SACP: Quantitative Risk-based Situational Awareness Calculation and Projection through Threat Information Sharing -- Dynamic Trust Boundary Identification for the Secure Communications of the Entities via 6G -- RTR-Shield: Early Detection of Ransomware using Registry and Trap Files -- MalXCap: A Method for Malware Capability Extraction -- Multimodal Software bug Severity Prediction Based on Sentiment Probability -- Recovering Multi-Prime RSA Keys with Erasures and Errors -- Performance Impact Analysis of Homomorphic Encryption: A Case Study Using Linear Regression as an Example -- Chosen Ciphertext Security for Blind Identity-based Encryption with Certified Identities -- A New Gadget Decomposition Algorithm with Less Noise Growth in HE schemes -- Malicious Player Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations -- Cryptanalysis of Human Identification Protocol with Human-Computable Passwords -- A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS) -- A Revocable Outsourced Data Accessing Control Scheme with Black-Box Traceability -- LocKey: Location-based Key Extraction from the WiFi Environment in the User’s Vicinity -- BAHS: a Blockchain-Aided Hash-based Signature Scheme -- Lever: Making Intensive Validation Practical on Blockchain -- Tikuna: An Ethereum Blockchain Network Security Monitoring System -- Isogeny-based Multi-Signature Scheme -- Security Analysis of WAGE against Division Property based Cube Attack -- When MPC in the Head meets VC -- Quantum Key Distribution as a Service and Its Injection into TLS -- XFedGraph-Hunter: An Interpretable Federated Learning Framework for Hunting Advanced Persistent Threat in Provenance Graph -- XSS attack detection by attention mechanism based on script tags in URLs -- Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning -- SIOCEN: Secure Integrity Verification of Outsourced Data in Cloud Storage using Blockchain.
Record Nr. UNISA-996565871203316
Meng Weizhi  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui