Security, Privacy, and Anonymity in Computation, Communication, and Storage
Springer International Publishing (Verlag)
978-3-319-72394-5 (ISBN)
The total of 75 papers presented in this volume was carefully reviewed and selected from a total of 190 submissions to all workshops:
UbiSafe 2017: The 9th IEEE International Symposium on UbiSafe Computing
ISSR 2017: The 9th IEEE International Workshop on Security in e-Science and e-Research
TrustData 2017: The 8th International Workshop on Trust, Security and Privacy for Big Data
TSP 2017: The 7th International Symposium on Trust, Security and Privacy for Emerging Applications
SPIoT 2017: The 6th International Symposium on Security and Privacy on Internet of Things
NOPE 2017: The 5th International Workshop on Network Optimization and Performance Evaluation
DependSys 2017: The Third International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications
SCS 2017: The Third International Symposium on Sensor-Cloud Systems
WCSSC 2017: The Second International Workshop on Cloud Storage Service and Computing
MSCF 2017: The First International Symposium on Multimedia Security and Digital Forensics
SPBD 2017: The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity
The 9th IEEE International Symposium on UbiSafe Computing (UbiSafe 2017).- MTIV: A Trustworthiness Determination Approach for Threat Intelligence.- CoDistributed Caching Based Memory Optimizing Technology for Stream Data of IoV.- Secure Transfer Protocol Between App and Device of Internet of Things.- Rogue Access Points Detection Based on Theory of SemiSupervised Learning.- Phishing Detection Method Based on Borderline-Smote Deep Belief Network.- Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field.- Security Review and Study of DoS Attack on DNS in the International Roaming EPC_LTE Network.- A SYN Flood Detection Method Based on Self - similarity in Network Traffic.- Annotating Network Service Fault based on Temporal Interval Relations.- The 9th IEEE International Workshop on Security in e-Science and e-Research (ISSR 2017).- An Anonymous Identity-Based Authentication Scheme in Vector Network.- The 8th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2017).- Two Improved Anonymous Authentication Methods for PCS.- Multi-Match Segments Similarity Join Algorithm Based on MapReduce.- GPU-accelerated Histogram Generation on Smart-phone and Webbrowser.- An Efficient Message Routing Algorithm Using Overhearing in Community Opportunistic Networks.- A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping.- Game Theoretical Analysis on System Adoption and Acceptance: A Review.- A Novel Bivariate Entropy-based Network Anomaly Detection System.- The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance.- Neural Network based Web Log Analysis for Web Intrusion Detection.- The 7th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2017).- Code Abstractions for Automatic Information Flow Control in a Model-Driven Approach.- WaybackVisor: Hypervisor-based Scalable Live Forensic Architecture for Timeline Analysis.- Cloud Ownership and Reliability - Issues and Developments.- A Trust-based Service Self-Organizing Model for Cloud Market.- A Reliable Resource Scheduling for Network Function Virtualization.- On Global Resource Allocation in Clusters for Data Analytics.- An Automatic Generation Method for Condition Expressions of CPN Model Focus on Tested Behaviors.- The 6th International Symposium on Security and Privacy on Internet of Things (SPIoT 2017).- Analysing the Resilience of the Internet of Things against Physical and Proximity Attacks.- Ensuring IoT/M2M System Security under the Limitation of Constrained Gateways.- Spatial Reconfigurable Physical Unclonable Functions for the Internet of Things.- Localizing Wireless Jamming Attacks with Minimal Network Resources.- The 5th International Workshop on Network Optimization and Performance Evaluation (NOPE 2017).- An Architecture of Urban Regional Health Information System andIts Data Conversion Algorithm.- CCN Hotspot Cache Placement Strategy Based on Genetic Algorithm.- The Impact of Routing Protocols on the Performance of a Mobility Model in Mobile Ad Hoc Network (MANET).- A Comparative Study of Zynq-based OpenFlow Switches in a Software/Hardware Co-design.- Design and Implementation of a Low-cost Software De ned Wireless Network Testbed for Smart Home.- Energy-efficiency Aware Cooperative Caching Strategy for Content-centric Networks.- The 3rd International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2017). -Password Recovery for ZIP Files Based on ARM-FPGA Cluster.- Comparison of Different Centrality Measures to Find Influential Nodes in Complex Networks.- An FPGA-based Algorithm to Accelerate Regular Expression Matching.- A Collaborative Filtering Recommendation Algorithm Based on Score Classification.- FluteDB: An Efficient and Dependable Time-Series Database Storage Engine.- Attacks on the Anti
| Erscheinungsdatum | 13.12.2017 |
|---|---|
| Reihe/Serie | Information Systems and Applications, incl. Internet/Web, and HCI | Lecture Notes in Computer Science |
| Zusatzinfo | XVI, 855 p. 314 illus. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 1293 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Schlagworte | Access Control • Applications • authentication • Cloud Computing • computer crime • Computer Science • conference proceedings • cryptography • Data Mining • Data Security • digital watermarking • electronic document identification systems • Informatics • Information Hiding • Internet • mobile computing • privacy • privacy preserving • Privacy Protection • pub keys (PK) • Public Key Cryptography • Research • Security Systems • Telecommunication networks • wireless telecommunication systems |
| ISBN-10 | 3-319-72394-4 / 3319723944 |
| ISBN-13 | 978-3-319-72394-5 / 9783319723945 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich