Cyberspace Safety and Security
portes grátis
Cyberspace Safety and Security
14th International Symposium, CSS 2022, Xi'an, China, October 16-18, 2022, Proceedings
Susilo, Willy; Shen, Jian; Chen, Xiaofeng
Springer International Publishing AG
09/2022
376
Mole
Inglês
9783031180668
15 a 20 dias
Descrição não disponível.
Cryptography and its applications.- Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead.- Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare.- Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q) .- A Collaborative Access Control Scheme based on Incentive Mechanism.- Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing.- Updatable Hybrid Encryption Scheme with No-directional Key Update for Cloud Storage.- Data security.- FDLedger: Dynamic and Efficient Anonymous Audit for Distributed Ledgers.- A Method of Traceless File Deletion for NTFS File System.- Efficient and Collusion Resistant Multi-Party Private Set Intersection Protocols for Large Participants and Small Sets Setting.- Attack and defense techniques.- High Quality Audio Adversarial Examples without Using Psychoacoustics.- Working Mechanism of Eternalblue and Its Application in Ransomworm.- Substitution Attacks against Sigma Protocols.- A Multi-stage APT Attack Detection Method based on Sample Enhancement.- VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer.- Network security and its applications.- Improvised Model for Blockchain in Distributed Cloud Environment.- Multi-hop Multi-key Homomorphic Encryption with Less Noise under CRS Model.- Design of Anti-machine Learning Malicious Node System based on Blockchain.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
access control;artificial intelligence;computer crime;cryptography;data communication systems;data privacy;data security;encryption;network protocols;network security;public key cryptography
Cryptography and its applications.- Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead.- Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare.- Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q) .- A Collaborative Access Control Scheme based on Incentive Mechanism.- Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing.- Updatable Hybrid Encryption Scheme with No-directional Key Update for Cloud Storage.- Data security.- FDLedger: Dynamic and Efficient Anonymous Audit for Distributed Ledgers.- A Method of Traceless File Deletion for NTFS File System.- Efficient and Collusion Resistant Multi-Party Private Set Intersection Protocols for Large Participants and Small Sets Setting.- Attack and defense techniques.- High Quality Audio Adversarial Examples without Using Psychoacoustics.- Working Mechanism of Eternalblue and Its Application in Ransomworm.- Substitution Attacks against Sigma Protocols.- A Multi-stage APT Attack Detection Method based on Sample Enhancement.- VDHGT: A Source Code Vulnerability Detection Method Based on Heterogeneous Graph Transformer.- Network security and its applications.- Improvised Model for Blockchain in Distributed Cloud Environment.- Multi-hop Multi-key Homomorphic Encryption with Less Noise under CRS Model.- Design of Anti-machine Learning Malicious Node System based on Blockchain.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.