Algorithms and architectures for parallel processing : 22nd International Conference, ICA3PP 2022, Copenhagen, Denmark, October 10-12, 2022, proceedings / / edited by Weizhi Meng, [and three others]
| Algorithms and architectures for parallel processing : 22nd International Conference, ICA3PP 2022, Copenhagen, Denmark, October 10-12, 2022, proceedings / / edited by Weizhi Meng, [and three others] |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
| Descrizione fisica | 1 online resource (818 pages) |
| Disciplina | 929.605 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico | Computer algorithms |
| ISBN | 3-031-22677-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996508668903316 |
| Cham, Switzerland : , : Springer, , [2023] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Algorithms and Architectures for Parallel Processing : 22nd International Conference, ICA3PP 2022, Copenhagen, Denmark, October 10–12, 2022, Proceedings / / edited by Weizhi Meng, Rongxing Lu, Geyong Min, Jaideep Vaidya
| Algorithms and Architectures for Parallel Processing : 22nd International Conference, ICA3PP 2022, Copenhagen, Denmark, October 10–12, 2022, Proceedings / / edited by Weizhi Meng, Rongxing Lu, Geyong Min, Jaideep Vaidya |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (818 pages) |
| Disciplina |
929.605
005.1 |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Algorithms
Computer engineering Computer networks Computer systems Computers, Special purpose Design and Analysis of Algorithms Computer Engineering and Networks Computer System Implementation Special Purpose and Application-Based Systems Computer Communication Networks |
| ISBN | 3-031-22677-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910644264503321 |
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Blockchain technology and emerging technologies : second EAI International Conference, BlockTEA 2022, Virtual event, November 21-22, 2022, proceedings / / edited by Weizhi Meng and WenJuan Li
| Blockchain technology and emerging technologies : second EAI International Conference, BlockTEA 2022, Virtual event, November 21-22, 2022, proceedings / / edited by Weizhi Meng and WenJuan Li |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
| Descrizione fisica | 1 online resource (181 pages) |
| Disciplina | 296 |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico | Blockchains (Databases) |
| ISBN |
9783031314209
9783031314193 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Smart contract -- ID-based self-encryption via Hyperledger Fabric based smart contract -- Scalable Smart Contracts for Linear Regression Algorithm Syed -- Combining ID’s, Attributes, and Policies in Hyperledger Fabric -- A Secure Microgrid Power Transaction Scheme Based on Hyperledger Fabric -- Privacy protection -- An Outsourced Multi-Authority Attribute-Based Encryption for Privacy Protection with Dynamicity and Audit -- A Privacy-preserving and Auditable Scheme for Interfacing Public Blockchain with Consortium Blockchain -- Data Cooperatives for Trusted News Sharing in Social Media -- NFT and Machine learning -- A Novel Fast Recovery Method for HT tamper in Embedded Processor -- MIA-Leak: Exploring Membership Inference Attacks in Federated Learning Systems -- SoK : Can NFTs Solve The Economic Problems of Countries with Ancient Heritage? Egypt as a Case Study. |
| Record Nr. | UNINA-9910720067003321 |
| Cham, Switzerland : , : Springer, , [2023] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Blockchain technology and emerging technologies : second EAI International Conference, BlockTEA 2022, Virtual event, November 21-22, 2022, proceedings / / edited by Weizhi Meng and WenJuan Li
| Blockchain technology and emerging technologies : second EAI International Conference, BlockTEA 2022, Virtual event, November 21-22, 2022, proceedings / / edited by Weizhi Meng and WenJuan Li |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
| Descrizione fisica | 1 online resource (181 pages) |
| Disciplina | 296 |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico | Blockchains (Databases) |
| ISBN |
9783031314209
9783031314193 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Smart contract -- ID-based self-encryption via Hyperledger Fabric based smart contract -- Scalable Smart Contracts for Linear Regression Algorithm Syed -- Combining ID’s, Attributes, and Policies in Hyperledger Fabric -- A Secure Microgrid Power Transaction Scheme Based on Hyperledger Fabric -- Privacy protection -- An Outsourced Multi-Authority Attribute-Based Encryption for Privacy Protection with Dynamicity and Audit -- A Privacy-preserving and Auditable Scheme for Interfacing Public Blockchain with Consortium Blockchain -- Data Cooperatives for Trusted News Sharing in Social Media -- NFT and Machine learning -- A Novel Fast Recovery Method for HT tamper in Embedded Processor -- MIA-Leak: Exploring Membership Inference Attacks in Federated Learning Systems -- SoK : Can NFTs Solve The Economic Problems of Countries with Ancient Heritage? Egypt as a Case Study. |
| Record Nr. | UNISA-996547952903316 |
| Cham, Switzerland : , : Springer, , [2023] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information and communications security : 22nd international conference, icics 2020, copenhagen, denmark, august 24-26, 2020, proceedings / / edited by Weizhi Meng, 3 others
| Information and communications security : 22nd international conference, icics 2020, copenhagen, denmark, august 24-26, 2020, proceedings / / edited by Weizhi Meng, 3 others |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
| Descrizione fisica | 1 online resource (XVI, 608 p. 51 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Cryptography Telecommunication - Security measures |
| ISBN | 3-030-61078-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Security I -- Crypto I -- Crypto II -- Security II -- Crypto III -- Crypto IV -- Security III -- Crypto V -- Crypto VI. . |
| Record Nr. | UNISA-996418223203316 |
| Cham, Switzerland : , : Springer, , [2020] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Information and Communications Security : 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020, Proceedings / / edited by Weizhi Meng, Dieter Gollmann, Christian D. Jensen, Jianying Zhou
| Information and Communications Security : 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24–26, 2020, Proceedings / / edited by Weizhi Meng, Dieter Gollmann, Christian D. Jensen, Jianying Zhou |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (XVI, 608 p. 51 illus.) |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data structures (Computer science)
Information theory Computer networks Cryptography Data encryption (Computer science) Data protection Computers - Law and legislation Information technology - Law and legislation Data Structures and Information Theory Computer Communication Networks Cryptology Data and Information Security Legal Aspects of Computing |
| ISBN | 3-030-61078-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Security I -- Crypto I -- Crypto II -- Security II -- Crypto III -- Crypto IV -- Security III -- Crypto V -- Crypto VI. . |
| Record Nr. | UNINA-9910427695203321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Protecting mobile networks and devices : challenges and solutions / / edited by Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou
| Protecting mobile networks and devices : challenges and solutions / / edited by Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou |
| Pubbl/distr/stampa | Boca Raton : , : CRC Press is an imprint of the Taylor & Francis Group, an Informa Business, , [2017] |
| Descrizione fisica | 1 online resource (334 pages) : illustrations |
| Disciplina | 005.4/46 |
| Collana | CRC Series in Security, Privacy and Trust |
| Soggetto topico |
Mobile communication systems - Security measures
Smartphones - Security measures |
| ISBN |
1-315-36964-8
1-4987-3592-4 1-315-35263-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Section I. Authentication techniques for mobile devices -- Section II. Mobile device privacy -- Section III. Mobile operating system vulnerabilities -- Section IV. Malware classification and detection -- Section V. Mobile network security. |
| Record Nr. | UNINA-9910153184703321 |
| Boca Raton : , : CRC Press is an imprint of the Taylor & Francis Group, an Informa Business, , [2017] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security and Privacy in New Computing Environments : third EAI international conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, proceedings / / Ding Wang, Weizhi Meng, Jinguang Han (editors)
| Security and Privacy in New Computing Environments : third EAI international conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, proceedings / / Ding Wang, Weizhi Meng, Jinguang Han (editors) |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
| Descrizione fisica | 1 online resource (XIII, 462 p. 122 illus., 108 illus. in color.) |
| Disciplina | 004 |
| Collana | Lecture notes of the Institute for Computer Sciences, Social Informatics, and Telecommunications Engineering |
| Soggetto topico | Cloud computing - Security measures |
| ISBN | 3-030-66922-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Network Security -- A Characterisation of Smart Grid DoS Attacks -- Security and Privacy in 5G Applications: Challenges and Solutions -- Alarm Elements based Adaptive Network Security Situation Prediction Model -- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback -- System Security -- Research on IoT Security Technology and Standardization in the 5G Era -- MIMEC Based Information System Security Situation Assessment Model -- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings -- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain -- Machine Learning -- Research on a Hybrid EMD-SVR Model for Time Series Prediction -- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity -- User Identity Linkage across Social Networks based on Neural Tensor Network -- An Efficient and Privacy-Preserving Physiological Case Classification Scheme for E-healthcare System -- A multi-class detection system for Android malicious Apps based on color image features -- Authentication and Access Control -- PUF-based Two-factor Group Authentication in Smart Home -- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems -- Access Control for Wireless Body Area Networks -- FIDO - that dog won’t hunt -- Blockchain-enabled user authentication in zero trust Internet of Things -- Cloud Security -- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage -- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain -- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data -- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration -- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing -- Cryptography -- Generative image steganography based on digital Cardan Grille -- Pixel Grouping Based Image Hashing for DIBR 3D Image -- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP -- Applied Cryptography -- A Verifiable Combinatorial Auction Scheme with Bidder’s Privacy Protection -- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query -- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User -- A3BAC: Attribute-Based Access Control Model with Anonymous Access -- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid. |
| Record Nr. | UNISA-996464384203316 |
| Cham, Switzerland : , : Springer, , [2021] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Security and Privacy in New Computing Environments : Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings / / edited by Ding Wang, Weizhi Meng, Jinguang Han
| Security and Privacy in New Computing Environments : Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings / / edited by Ding Wang, Weizhi Meng, Jinguang Han |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
| Descrizione fisica | 1 online resource (XIII, 462 p. 122 illus., 108 illus. in color.) |
| Disciplina | 004 |
| Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Soggetto topico |
Computer networks - Security measures
Data protection Cryptography Data encryption (Computer science) Application software Mobile and Network Security Data and Information Security Cryptology Security Services Computer and Information Systems Applications |
| ISBN | 3-030-66922-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Network Security -- A Characterisation of Smart Grid DoS Attacks -- Security and Privacy in 5G Applications: Challenges and Solutions -- Alarm Elements based Adaptive Network Security Situation Prediction Model -- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback -- System Security -- Research on IoT Security Technology and Standardization in the 5G Era -- MIMEC Based Information System Security Situation Assessment Model -- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings -- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain -- Machine Learning -- Research on a Hybrid EMD-SVR Model for Time Series Prediction -- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity -- User Identity Linkage across Social Networks based on Neural Tensor Network -- An Efficient and Privacy-Preserving Physiological Case Classification Scheme forE-healthcare System -- A multi-class detection system for Android malicious Apps based on color image features -- Authentication and Access Control -- PUF-based Two-factor Group Authentication in Smart Home -- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems -- Access Control for Wireless Body Area Networks -- FIDO - that dog won’t hunt -- Blockchain-enabled user authentication in zero trust Internet of Things -- Cloud Security -- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage -- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain -- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data -- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration -- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing -- Cryptography -- Generative image steganography based on digital Cardan Grille -- Pixel Grouping Based Image Hashing for DIBR 3D Image -- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP -- Applied Cryptography -- A Verifiable Combinatorial Auction Scheme with Bidder’s Privacy Protection -- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query -- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User -- A3BAC: Attribute-Based Access Control Model with Anonymous Access -- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid. |
| Record Nr. | UNINA-9910484752803321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Security and Trust Management : 18th International Workshop, STM 2022, Copenhagen, Denmark, September 29, 2022, Proceedings / / Gabriele Lenzini and Weizhi Meng, editors
| Security and Trust Management : 18th International Workshop, STM 2022, Copenhagen, Denmark, September 29, 2022, Proceedings / / Gabriele Lenzini and Weizhi Meng, editors |
| Edizione | [First edition.] |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023] |
| Descrizione fisica | 1 online resource (205 pages) |
| Disciplina | 005.8 |
| Collana | Lecture Notes in Computer Science Series |
| Soggetto topico | Computer security |
| ISBN |
9783031295041
9783031295034 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Security and Authentication -- Deep Learning for security and trust -- Data Analysis of security and trust -- Trust and Security. |
| Record Nr. | UNISA-996525672003316 |
| Cham, Switzerland : , : Springer Nature Switzerland AG, , [2023] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||