找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security, Privacy, and Anonymity in Computation, Communication, and Storage; 12th International C Guojun Wang,Jun Feng,Rongxing Lu Conferen

[复制链接]
查看: 41677|回复: 63
发表于 2025-3-21 17:52:59 | 显示全部楼层 |阅读模式
书目名称Security, Privacy, and Anonymity in Computation, Communication, and Storage
副标题12th International C
编辑Guojun Wang,Jun Feng,Rongxing Lu
视频video
丛书名称Lecture Notes in Computer Science
图书封面Titlebook: Security, Privacy, and Anonymity in Computation, Communication, and Storage; 12th International C Guojun Wang,Jun Feng,Rongxing Lu Conferen
描述.This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2019, held in Atlanta, GA, USA in July 2019. The 37 full papers were carefully reviewed and selected from 109 submissions..The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage..
出版日期Conference proceedings 2019
关键词artificial intelligence; authentication; cloud computing; computer crime; computer networks; cryptography
版次1
doihttps://doi.org/10.1007/978-3-030-24907-6
isbn_softcover978-3-030-24906-9
isbn_ebook978-3-030-24907-6Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer Nature Switzerland AG 2019
The information of publication is updating

书目名称Security, Privacy, and Anonymity in Computation, Communication, and Storage影响因子(影响力)




书目名称Security, Privacy, and Anonymity in Computation, Communication, and Storage影响因子(影响力)学科排名




书目名称Security, Privacy, and Anonymity in Computation, Communication, and Storage网络公开度




书目名称Security, Privacy, and Anonymity in Computation, Communication, and Storage网络公开度学科排名




书目名称Security, Privacy, and Anonymity in Computation, Communication, and Storage被引频次




书目名称Security, Privacy, and Anonymity in Computation, Communication, and Storage被引频次学科排名




书目名称Security, Privacy, and Anonymity in Computation, Communication, and Storage年度引用




书目名称Security, Privacy, and Anonymity in Computation, Communication, and Storage年度引用学科排名




书目名称Security, Privacy, and Anonymity in Computation, Communication, and Storage读者反馈




书目名称Security, Privacy, and Anonymity in Computation, Communication, and Storage读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 23:27:11 | 显示全部楼层
Blockchain-Based Mobility Management for LTE and Beyond,pre-handover phase, which significantly reduces the number of operations required during the intra-handover phase. A formal security analysis on BKDF is conducted with the Burrows-Abadi-Needham (BAN) logic, followed by an analysis on the effectiveness of BKDF against some of the well-known types of
发表于 2025-3-22 03:40:49 | 显示全部楼层
Ensuring Data Integrity in Fog Computing Based Health-Care Systems,t any damage done by a malicious transaction and spread by valid transactions must be corrected immediately and accurately. Here, we present two models for using fog computing in healthcare: an architecture using fog modules with heterogeneous data, and another using fog modules with homogeneous dat
发表于 2025-3-22 05:07:59 | 显示全部楼层
Modelling Security Requirements for Software Development with Common Criteria, this paper, we present a Usage Scenario and a Conceptual Model by extracting key security-related concepts from Common Criteria. The effectiveness is illustrated by a case study on Facebook Meta-Model, which is built for the evaluation purpose of Common Criteria models.
发表于 2025-3-22 10:16:36 | 显示全部楼层
Visualization of DNS Tunneling Attacks Using Parallel Coordinates Technique,ed for distinguishing between normal DNS traffic and malicious traffic containing DNS tunneling attacks. Finally, the proposed system was able to visualize the DNS tunneling attack efficiently for the future work of creating an efficient detection system.
发表于 2025-3-22 16:21:06 | 显示全部楼层
发表于 2025-3-22 20:30:45 | 显示全部楼层
Towards H-SDN Traffic Analytic Through Visual Analytics and Machine Learning,ed that data analytics applications have been successfully developed for various purposes as network security, traffic monitoring and traffic engineering. The success of data analytic applications is highly dependent on prior data analysis from both automated processing and human analysis. However,
发表于 2025-3-22 22:05:04 | 显示全部楼层
Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Dataur proposed DNN classifiers resulted in the highest accuracies with 100%. The others included: Logistic Regression (LR), Linear Discriminant Analysis (LDA), Gaussian Naive Bayes (NB), Neural Network, and VGGNet with the accuracy scores of 94.7%, 95.9%, 31.9%, 88.8%, and 96.1%, respectively.
发表于 2025-3-23 04:28:08 | 显示全部楼层
Paper Document Authentication Using Print-Scan Resistant Image Hashing and Public-Key Cryptography,e, extracted from a QR code, is decrypted with the public key of trusted authorities for identity verification, thus provides offline verification of printed documents without the need of online network access or database.
发表于 2025-3-23 08:48:38 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-14 16:28
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表