Algorithms and architectures for parallel processing : 22nd International Conference, ICA3PP 2022, Copenhagen, Denmark, October 10-12, 2022, proceedings / / edited by Weizhi Meng, [and three others] |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (818 pages) |
Disciplina | 929.605 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Computer algorithms |
ISBN | 3-031-22677-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910644264503321 |
Cham, Switzerland : , : Springer, , [2023] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Algorithms and architectures for parallel processing : 22nd International Conference, ICA3PP 2022, Copenhagen, Denmark, October 10-12, 2022, proceedings / / edited by Weizhi Meng, [and three others] |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (818 pages) |
Disciplina | 929.605 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Computer algorithms |
ISBN | 3-031-22677-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996508668903316 |
Cham, Switzerland : , : Springer, , [2023] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Blockchain technology and emerging technologies : second EAI International Conference, BlockTEA 2022, Virtual event, November 21-22, 2022, proceedings / / edited by Weizhi Meng and WenJuan Li |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (181 pages) |
Disciplina | 296 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico | Blockchains (Databases) |
ISBN |
9783031314209
9783031314193 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Smart contract -- ID-based self-encryption via Hyperledger Fabric based smart contract -- Scalable Smart Contracts for Linear Regression Algorithm Syed -- Combining ID’s, Attributes, and Policies in Hyperledger Fabric -- A Secure Microgrid Power Transaction Scheme Based on Hyperledger Fabric -- Privacy protection -- An Outsourced Multi-Authority Attribute-Based Encryption for Privacy Protection with Dynamicity and Audit -- A Privacy-preserving and Auditable Scheme for Interfacing Public Blockchain with Consortium Blockchain -- Data Cooperatives for Trusted News Sharing in Social Media -- NFT and Machine learning -- A Novel Fast Recovery Method for HT tamper in Embedded Processor -- MIA-Leak: Exploring Membership Inference Attacks in Federated Learning Systems -- SoK : Can NFTs Solve The Economic Problems of Countries with Ancient Heritage? Egypt as a Case Study. |
Record Nr. | UNINA-9910720067003321 |
Cham, Switzerland : , : Springer, , [2023] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Blockchain technology and emerging technologies : second EAI International Conference, BlockTEA 2022, Virtual event, November 21-22, 2022, proceedings / / edited by Weizhi Meng and WenJuan Li |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (181 pages) |
Disciplina | 296 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico | Blockchains (Databases) |
ISBN |
9783031314209
9783031314193 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Smart contract -- ID-based self-encryption via Hyperledger Fabric based smart contract -- Scalable Smart Contracts for Linear Regression Algorithm Syed -- Combining ID’s, Attributes, and Policies in Hyperledger Fabric -- A Secure Microgrid Power Transaction Scheme Based on Hyperledger Fabric -- Privacy protection -- An Outsourced Multi-Authority Attribute-Based Encryption for Privacy Protection with Dynamicity and Audit -- A Privacy-preserving and Auditable Scheme for Interfacing Public Blockchain with Consortium Blockchain -- Data Cooperatives for Trusted News Sharing in Social Media -- NFT and Machine learning -- A Novel Fast Recovery Method for HT tamper in Embedded Processor -- MIA-Leak: Exploring Membership Inference Attacks in Federated Learning Systems -- SoK : Can NFTs Solve The Economic Problems of Countries with Ancient Heritage? Egypt as a Case Study. |
Record Nr. | UNISA-996547952903316 |
Cham, Switzerland : , : Springer, , [2023] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information and communications security : 22nd international conference, icics 2020, copenhagen, denmark, august 24-26, 2020, proceedings / / edited by Weizhi Meng, 3 others |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XVI, 608 p. 51 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Cryptography Telecommunication - Security measures |
ISBN | 3-030-61078-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security I -- Crypto I -- Crypto II -- Security II -- Crypto III -- Crypto IV -- Security III -- Crypto V -- Crypto VI. . |
Record Nr. | UNINA-9910427695203321 |
Cham, Switzerland : , : Springer, , [2020] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Information and communications security : 22nd international conference, icics 2020, copenhagen, denmark, august 24-26, 2020, proceedings / / edited by Weizhi Meng, 3 others |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XVI, 608 p. 51 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Cryptography Telecommunication - Security measures |
ISBN | 3-030-61078-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security I -- Crypto I -- Crypto II -- Security II -- Crypto III -- Crypto IV -- Security III -- Crypto V -- Crypto VI. . |
Record Nr. | UNISA-996418223203316 |
Cham, Switzerland : , : Springer, , [2020] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Protecting mobile networks and devices : challenges and solutions / / edited by Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou |
Pubbl/distr/stampa | Boca Raton : , : CRC Press is an imprint of the Taylor & Francis Group, an Informa Business, , [2017] |
Descrizione fisica | 1 online resource (334 pages) : illustrations |
Disciplina | 005.4/46 |
Collana | CRC Series in Security, Privacy and Trust |
Soggetto topico |
Mobile communication systems - Security measures
Smartphones - Security measures |
ISBN |
1-315-36964-8
1-4987-3592-4 1-315-35263-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Section I. Authentication techniques for mobile devices -- Section II. Mobile device privacy -- Section III. Mobile operating system vulnerabilities -- Section IV. Malware classification and detection -- Section V. Mobile network security. |
Record Nr. | UNINA-9910153184703321 |
Boca Raton : , : CRC Press is an imprint of the Taylor & Francis Group, an Informa Business, , [2017] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Privacy in New Computing Environments : third EAI international conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, proceedings / / Ding Wang, Weizhi Meng, Jinguang Han (editors) |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XIII, 462 p. 122 illus., 108 illus. in color.) |
Disciplina | 004 |
Collana | Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering |
Soggetto topico | Cloud computing - Security measures |
ISBN | 3-030-66922-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Network Security -- A Characterisation of Smart Grid DoS Attacks -- Security and Privacy in 5G Applications: Challenges and Solutions -- Alarm Elements based Adaptive Network Security Situation Prediction Model -- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback -- System Security -- Research on IoT Security Technology and Standardization in the 5G Era -- MIMEC Based Information System Security Situation Assessment Model -- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings -- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain -- Machine Learning -- Research on a Hybrid EMD-SVR Model for Time Series Prediction -- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity -- User Identity Linkage across Social Networks based on Neural Tensor Network -- An Efficient and Privacy-Preserving Physiological Case Classification Scheme for E-healthcare System -- A multi-class detection system for Android malicious Apps based on color image features -- Authentication and Access Control -- PUF-based Two-factor Group Authentication in Smart Home -- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems -- Access Control for Wireless Body Area Networks -- FIDO - that dog won’t hunt -- Blockchain-enabled user authentication in zero trust Internet of Things -- Cloud Security -- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage -- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain -- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data -- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration -- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing -- Cryptography -- Generative image steganography based on digital Cardan Grille -- Pixel Grouping Based Image Hashing for DIBR 3D Image -- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP -- Applied Cryptography -- A Verifiable Combinatorial Auction Scheme with Bidder’s Privacy Protection -- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query -- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User -- A3BAC: Attribute-Based Access Control Model with Anonymous Access -- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid. |
Record Nr. | UNINA-9910484752803321 |
Cham, Switzerland : , : Springer, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Privacy in New Computing Environments : third EAI international conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, proceedings / / Ding Wang, Weizhi Meng, Jinguang Han (editors) |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XIII, 462 p. 122 illus., 108 illus. in color.) |
Disciplina | 004 |
Collana | Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering |
Soggetto topico | Cloud computing - Security measures |
ISBN | 3-030-66922-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Network Security -- A Characterisation of Smart Grid DoS Attacks -- Security and Privacy in 5G Applications: Challenges and Solutions -- Alarm Elements based Adaptive Network Security Situation Prediction Model -- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback -- System Security -- Research on IoT Security Technology and Standardization in the 5G Era -- MIMEC Based Information System Security Situation Assessment Model -- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings -- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain -- Machine Learning -- Research on a Hybrid EMD-SVR Model for Time Series Prediction -- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity -- User Identity Linkage across Social Networks based on Neural Tensor Network -- An Efficient and Privacy-Preserving Physiological Case Classification Scheme for E-healthcare System -- A multi-class detection system for Android malicious Apps based on color image features -- Authentication and Access Control -- PUF-based Two-factor Group Authentication in Smart Home -- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems -- Access Control for Wireless Body Area Networks -- FIDO - that dog won’t hunt -- Blockchain-enabled user authentication in zero trust Internet of Things -- Cloud Security -- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage -- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain -- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data -- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration -- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing -- Cryptography -- Generative image steganography based on digital Cardan Grille -- Pixel Grouping Based Image Hashing for DIBR 3D Image -- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP -- Applied Cryptography -- A Verifiable Combinatorial Auction Scheme with Bidder’s Privacy Protection -- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query -- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User -- A3BAC: Attribute-Based Access Control Model with Anonymous Access -- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid. |
Record Nr. | UNISA-996464384203316 |
Cham, Switzerland : , : Springer, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security and Trust Management : 18th International Workshop, STM 2022, Copenhagen, Denmark, September 29, 2022, Proceedings / / Gabriele Lenzini and Weizhi Meng, editors |
Edizione | [First edition.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023] |
Descrizione fisica | 1 online resource (205 pages) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science Series |
Soggetto topico | Computer security |
ISBN |
9783031295041
9783031295034 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security and Authentication -- Deep Learning for security and trust -- Data Analysis of security and trust -- Trust and Security. |
Record Nr. | UNISA-996525672003316 |
Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023] | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|