Security and Privacy in New Computing Environments

Security and Privacy in New Computing Environments

4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings

Choo, Kim-Kwang Raymond; Shi, Wenbo; Chen, Xiaofeng

Springer Nature Switzerland AG

03/2022

396

Mole

Inglês

9783030967901

15 a 20 dias

629

Descrição não disponível.
Blockchain-based Outsourcing Shared Car Risk Prediction Scheme Design.- Fairness Protection Method of Vickery Auction Based on Smart Contract.- An Improved Needham-Schroeder Session Key Distribution Protocol For In-Vehicle CAN Network.- Research on Two-Party Cooperative Aigis-sig Digital Signature Protocol.- An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection.- A Lightweight PSIS Scheme Based on Multi-Node Collaboration in the IoT.- SAD: Website Fingerprint Defense based on Adversarial Examples.- A privacy-aware and time-limited data access control scheme with large universe and public traceability for Cloud-based IoD.- Multi-Party High-Dimensional Related Data Publishing via Probabilistic Principal Component Analysis and Differential Privacy.- ource code vulnerability detection method with multidimensional representation.- A Security Enhanced Verification Framework Based on Device Fingerprint in Internet of Things.- RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient.- Linear Policy Recommender Scheme for Large-Scale Attribute-based Access Control.- Non-interactive Privacy-preserving Naive Bayes Classifier Using Homomorphic Encryption.- BA-Audit: blockchain-based public auditing for aggregated data sharing in edge-assisted IoT.- Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System.- Threat Detection-Oriented Network Security Situation Assessment Method.- System Business Affecting Impact Analysis Method with Crossover Probability Theory.- RAP: A Lightweight Application Layer Defense against Website Fingerprinting.- FL-iotDP: Differential Private Federated Neural Network.- Analysis of Vulnerability of IPsec Protocol Implementation Based on Differential Fuzzing.- Honeywords Generation Method Based on Deep Learning and Rule-based Password Attack.- Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning.- GLV/GLS Scalar Multiplication on Twisted Edwards Curves.- Online Privacy of Personal Information - Perceptions v Reality.- ARTPHIL: Reversible de-identification of free-text using an integrated model Bayan.- CAFM: Precise Classication for Android Family Malware.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
access control;artificial intelligence;authentication;computer crime;computer hardware;computer networks;computer science;computer security;computer systems;cryptography;data mining;data security;education;engineering;internet;machine learning;network protocols;network security;privacy;signal processing