top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Blockchain : Empowering Secure Data Sharing / / by Meng Shen, Liehuang Zhu, Ke Xu
Blockchain : Empowering Secure Data Sharing / / by Meng Shen, Liehuang Zhu, Ke Xu
Autore Shen Meng
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XII, 130 p. 53 illus., 33 illus. in color.) : illustrations
Disciplina 378.1662
Soggetto topico Computer communication systems
Computer security
Data encryption (Computer science)
Information storage and retrieval
Computer Communication Networks
Systems and Data Security
Cryptology
Information Storage and Retrieval
ISBN 981-15-5939-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Introduction -- Chapter 2. Blockchain and Data Sharing -- Chapter 3. Layered Data Sharing Architecture with Blockchain -- Chapter 4. Secure Homogeneous Data Sharing Using Blockchain -- Chapter 5. Secure Heterogeneous Data Sharing Using Blockchain -- Chapter 6. Secure Data Retrieval Using Blockchain -- Chapter 7. Data Sharing Incentives with Blockchain.
Record Nr. UNISA-996465356803316
Shen Meng  
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Blockchain : Empowering Secure Data Sharing / / by Meng Shen, Liehuang Zhu, Ke Xu
Blockchain : Empowering Secure Data Sharing / / by Meng Shen, Liehuang Zhu, Ke Xu
Autore Shen Meng
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XII, 130 p. 53 illus., 33 illus. in color.) : illustrations
Disciplina 378.1662
Soggetto topico Computer communication systems
Computer security
Data encryption (Computer science)
Information storage and retrieval
Computer Communication Networks
Systems and Data Security
Cryptology
Information Storage and Retrieval
ISBN 981-15-5939-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Introduction -- Chapter 2. Blockchain and Data Sharing -- Chapter 3. Layered Data Sharing Architecture with Blockchain -- Chapter 4. Secure Homogeneous Data Sharing Using Blockchain -- Chapter 5. Secure Heterogeneous Data Sharing Using Blockchain -- Chapter 6. Secure Data Retrieval Using Blockchain -- Chapter 7. Data Sharing Incentives with Blockchain.
Record Nr. UNINA-9910413446703321
Shen Meng  
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Blockchain Technology and Application [[electronic resource] ] : Second CCF China Blockchain Conference, CBCC 2019, Chengdu, China, October 11–13, 2019, Revised Selected Papers / / edited by Xueming Si, Hai Jin, Yi Sun, Jianming Zhu, Liehuang Zhu, Xianhua Song, Zeguang Lu
Blockchain Technology and Application [[electronic resource] ] : Second CCF China Blockchain Conference, CBCC 2019, Chengdu, China, October 11–13, 2019, Revised Selected Papers / / edited by Xueming Si, Hai Jin, Yi Sun, Jianming Zhu, Liehuang Zhu, Xianhua Song, Zeguang Lu
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (X, 243 p. 116 illus., 72 illus. in color.)
Disciplina 005.74
Collana Communications in Computer and Information Science
Soggetto topico Computer organization
Operating systems (Computers)
Database management
Computer software
Application software
Data encryption (Computer science)
Computer Systems Organization and Communication Networks
Operating Systems
Database Management
Professional Computing
Information Systems Applications (incl. Internet)
Cryptology
ISBN 981-15-3278-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto OBBC-A Blockchain-based Data Sharing Scheme for Open Banking -- FutureOTC: An Intelligent Decentralized OTC Option Trading and E-contract Signing System-Forgetting Markov Model for Next-Basket Recommendation -- One-stop Efficient PKI Authentication Service Model Based on Blockchain -- Distributed Electronic Data Storage and Proof System Based on Blockchain -- Bye Audit! A Novel Blockchain-based Automated Data Processing Scheme for Bank Audit Confirmation -- A New Approach to Prevent Reentrant Attack in Solidity Smart Contracts -- CoT: A Secure Consensus of Trust with Delegation Mechanism in Blockchains -- A Uniform Payment System for Hyperledger Fabric Blockchain -- Identity-Based Cross-Domain Authentication by Blockchain via PKI Environment -- Blockchain-based Content Name Search Mechanism in NDN -- Dizar: An Architecture of Distributed Public Key Infrastructure Based on Permissoned Blockchain -- Optimization Scheme of Consensus Mechanism Based on Practical Byzantine Fault Tolerance Algorithm -- The Trojan Message Attack on the Pay-to-Public-Key-Hash Protocol of Bitcoin -- Blockchain-based Implementation of Smart Contract and Risk Management for Interest Rate Swap -- Overview and Thoughts on Standardization of China's Blockchain Technology -- Routing Optimization for High Speed Photon State-Channel Architecture.
Record Nr. UNINA-9910380745903321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Blockchain Technology and Application [[electronic resource] ] : Second CCF China Blockchain Conference, CBCC 2019, Chengdu, China, October 11–13, 2019, Revised Selected Papers / / edited by Xueming Si, Hai Jin, Yi Sun, Jianming Zhu, Liehuang Zhu, Xianhua Song, Zeguang Lu
Blockchain Technology and Application [[electronic resource] ] : Second CCF China Blockchain Conference, CBCC 2019, Chengdu, China, October 11–13, 2019, Revised Selected Papers / / edited by Xueming Si, Hai Jin, Yi Sun, Jianming Zhu, Liehuang Zhu, Xianhua Song, Zeguang Lu
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (X, 243 p. 116 illus., 72 illus. in color.)
Disciplina 005.74
Collana Communications in Computer and Information Science
Soggetto topico Computer organization
Operating systems (Computers)
Database management
Computer software
Application software
Data encryption (Computer science)
Computer Systems Organization and Communication Networks
Operating Systems
Database Management
Professional Computing
Information Systems Applications (incl. Internet)
Cryptology
ISBN 981-15-3278-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto OBBC-A Blockchain-based Data Sharing Scheme for Open Banking -- FutureOTC: An Intelligent Decentralized OTC Option Trading and E-contract Signing System-Forgetting Markov Model for Next-Basket Recommendation -- One-stop Efficient PKI Authentication Service Model Based on Blockchain -- Distributed Electronic Data Storage and Proof System Based on Blockchain -- Bye Audit! A Novel Blockchain-based Automated Data Processing Scheme for Bank Audit Confirmation -- A New Approach to Prevent Reentrant Attack in Solidity Smart Contracts -- CoT: A Secure Consensus of Trust with Delegation Mechanism in Blockchains -- A Uniform Payment System for Hyperledger Fabric Blockchain -- Identity-Based Cross-Domain Authentication by Blockchain via PKI Environment -- Blockchain-based Content Name Search Mechanism in NDN -- Dizar: An Architecture of Distributed Public Key Infrastructure Based on Permissoned Blockchain -- Optimization Scheme of Consensus Mechanism Based on Practical Byzantine Fault Tolerance Algorithm -- The Trojan Message Attack on the Pay-to-Public-Key-Hash Protocol of Bitcoin -- Blockchain-based Implementation of Smart Contract and Risk Management for Interest Rate Swap -- Overview and Thoughts on Standardization of China's Blockchain Technology -- Routing Optimization for High Speed Photon State-Channel Architecture.
Record Nr. UNISA-996465356703316
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Mobile Ad-hoc and Sensor Networks [[electronic resource] ] : 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers / / edited by Liehuang Zhu, Sheng Zhong
Mobile Ad-hoc and Sensor Networks [[electronic resource] ] : 13th International Conference, MSN 2017, Beijing, China, December 17-20, 2017, Revised Selected Papers / / edited by Liehuang Zhu, Sheng Zhong
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XII, 524 p.)
Disciplina 004.685
Collana Communications in Computer and Information Science
Soggetto topico Computer networks
Application software
Data protection
Computer Communication Networks
Computer and Information Systems Applications
Data and Information Security
ISBN 981-10-8890-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multi-hop wireless networks and wireless mesh networks -- Sensor and actuator networks -- Vehicle ad hoc networks -- Mobile social network -- Delay tolerant networks and opportunistic networking -- Cyber-physical systems -- Internet of things -- System modeling and performance analysis -- Routing and network protocols -- Data transport and management in mobile networks -- Resource management and wireless QoS provisioning -- Security and privacy -- Cross layer design and optimization -- Novel applications and architectures.
Record Nr. UNINA-9910299290703321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trusted Computing and Information Security [[electronic resource] ] : 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24–27, 2019, Revised Selected Papers / / edited by Weili Han, Liehuang Zhu, Fei Yan
Trusted Computing and Information Security [[electronic resource] ] : 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24–27, 2019, Revised Selected Papers / / edited by Weili Han, Liehuang Zhu, Fei Yan
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XII, 356 p. 166 illus., 79 illus. in color.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer networks - Security measures
Computer security
Computer communication systems
Application software
Data encryption (Computer science)
Mobile and Network Security
Security Services
Computer Communication Networks
Information Systems Applications (incl. Internet)
Cryptology
Systems and Data Security
ISBN 981-15-3418-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Generative image Steganography based on GANs -- Partial blind proxy re-signature scheme for mobile internet -- Information Flow-Based Security Construction for Compositional Interface Automata -- Provably secure server-assisted verification threshold proxy re-signature scheme -- ReJection: A AST-based Reentrancy Vulnerability Detection Method -- Identity authentication under Internet of everything based on edge computing -- STC: Improving the Performance of Virtual Machines Based on Task Classification -- A Method for Realizing Covert Communication at Router Driving Layer -- A secure multi-party signature scheme based on trust mechanism -- Virtual FPGA Placement with An Efficient Ant Colony Optimization -- Identity-based threshold group signature scheme of Blockchain verification -- ByteDroid: Android Malware Detection using Deep Learning on Bytecode Sequences -- Research on Multidimensional System Security Assessment Based on AHP and Gray Correlation -- Research on Software Network Key Nodes Mining Methods Based on Complex Network -- Research and development of TPM virtualization -- A Secure Certificateless Identity Authentication Scheme Based on Blockchain -- A trust-based security research method for Internet of things terminal -- A QoS&SLA-driven Multifaceted Trust Model for Cloud Computing -- A Lossless Data hiding Scheme in Public Key Encrypted Domain based on homomorphic Key-Switching -- A Detection Approach for Buffer Overflow Vulnerability based on Data Control Flow Graph -- Outsourced Data Integrity Auditing for Efficient Batch Dynamic Updates -- Secure Personal Health Records Sharing based on Blockchain and IPFS. .
Record Nr. UNINA-9910380746603321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trusted Computing and Information Security [[electronic resource] ] : 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24–27, 2019, Revised Selected Papers / / edited by Weili Han, Liehuang Zhu, Fei Yan
Trusted Computing and Information Security [[electronic resource] ] : 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24–27, 2019, Revised Selected Papers / / edited by Weili Han, Liehuang Zhu, Fei Yan
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XII, 356 p. 166 illus., 79 illus. in color.)
Disciplina 005.8
Collana Communications in Computer and Information Science
Soggetto topico Computer networks - Security measures
Computer security
Computer communication systems
Application software
Data encryption (Computer science)
Mobile and Network Security
Security Services
Computer Communication Networks
Information Systems Applications (incl. Internet)
Cryptology
Systems and Data Security
ISBN 981-15-3418-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Generative image Steganography based on GANs -- Partial blind proxy re-signature scheme for mobile internet -- Information Flow-Based Security Construction for Compositional Interface Automata -- Provably secure server-assisted verification threshold proxy re-signature scheme -- ReJection: A AST-based Reentrancy Vulnerability Detection Method -- Identity authentication under Internet of everything based on edge computing -- STC: Improving the Performance of Virtual Machines Based on Task Classification -- A Method for Realizing Covert Communication at Router Driving Layer -- A secure multi-party signature scheme based on trust mechanism -- Virtual FPGA Placement with An Efficient Ant Colony Optimization -- Identity-based threshold group signature scheme of Blockchain verification -- ByteDroid: Android Malware Detection using Deep Learning on Bytecode Sequences -- Research on Multidimensional System Security Assessment Based on AHP and Gray Correlation -- Research on Software Network Key Nodes Mining Methods Based on Complex Network -- Research and development of TPM virtualization -- A Secure Certificateless Identity Authentication Scheme Based on Blockchain -- A trust-based security research method for Internet of things terminal -- A QoS&SLA-driven Multifaceted Trust Model for Cloud Computing -- A Lossless Data hiding Scheme in Public Key Encrypted Domain based on homomorphic Key-Switching -- A Detection Approach for Buffer Overflow Vulnerability based on Data Control Flow Graph -- Outsourced Data Integrity Auditing for Efficient Batch Dynamic Updates -- Secure Personal Health Records Sharing based on Blockchain and IPFS. .
Record Nr. UNISA-996465353203316
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trusted Systems [[electronic resource] ] : 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers / / edited by Moti Yung, Liehuang Zhu, Yanjiang Yang
Trusted Systems [[electronic resource] ] : 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers / / edited by Moti Yung, Liehuang Zhu, Yanjiang Yang
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIII, 442 p. 83 illus. in color.)
Disciplina 511.3
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Operating systems (Computers)
Computer communication systems
Management information systems
Computer science
Computer science—Mathematics
Systems and Data Security
Cryptology
Operating Systems
Computer Communication Networks
Management of Computing and Information Systems
Discrete Mathematics in Computer Science
ISBN 3-319-27998-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Signature and authentication -- Secure protocols and access control -- Cloud security -- cryptographic aspects -- Software security -- Security analysis -- Secure communication and privacy.
Record Nr. UNINA-9910484936803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trusted Systems [[electronic resource] ] : 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers / / edited by Moti Yung, Liehuang Zhu, Yanjiang Yang
Trusted Systems [[electronic resource] ] : 6th International Conference, INTRUST 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers / / edited by Moti Yung, Liehuang Zhu, Yanjiang Yang
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIII, 442 p. 83 illus. in color.)
Disciplina 511.3
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Operating systems (Computers)
Computer communication systems
Management information systems
Computer science
Computer science—Mathematics
Systems and Data Security
Cryptology
Operating Systems
Computer Communication Networks
Management of Computing and Information Systems
Discrete Mathematics in Computer Science
ISBN 3-319-27998-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Signature and authentication -- Secure protocols and access control -- Cloud security -- cryptographic aspects -- Software security -- Security analysis -- Secure communication and privacy.
Record Nr. UNISA-996466368103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trusted Systems [[electronic resource] ] : Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers / / edited by Liqun Chen, Moti Yung, Liehuang Zhu
Trusted Systems [[electronic resource] ] : Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers / / edited by Liqun Chen, Moti Yung, Liehuang Zhu
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XII, 351 p. 77 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Electronic data processing—Management
Computer networks
Computers and civilization
Information technology—Management
Data and Information Security
Cryptology
IT Operations
Computer Communication Networks
Computers and Society
Computer Application in Administrative Data Processing
ISBN 3-642-32298-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Flexible Software Development and Emulation Framework for ARM TrustZone -- Mass Transit Ticketing with NFC Mobile Phones --  Some Improvements to the Cost-Based Framework for Analyzing -- Denial of Service Attacks --  Fault Detection of the MacGuffin Cipher against Differential Fault Attack -- Computationally Sound Symbolic Analysis of EAP-TNC Protocol -- A Technique for Remote Detection of Certain Virtual Machine Monitors --  Indifferentiability of Domain Extension Modes for Hash Functions.
Record Nr. UNISA-996465758703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui