Trusted Computing and Information Security
Springer Verlag, Singapore
978-981-13-5912-5 (ISBN)
The 24 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, and network security.
Ciphertext-Policy Attribute-Based Encryption for Circuits from Lattices under Weak Security Model.- Impossible Differential Cryptanalysis of SPECK.- Detect Peer-To-Peer Botnet with Permutation Entropy and Adaptive Information Fusion.- Research of Snort Rule Extension and APT Detection Based on APT Network Behavior Analysis.- Network Risk Assessment Method Based on Asset Correlation Graph.- Password Guessing Based on Semantic Analysis and Neural Networks.- An Approach of Implementing SW-TPM in Real-Time Operating System.- A Multilevel Trusted Clustering Mechanism for the Awareness Layer of the Internet of Things.- A Multi-Layer Virtual Network Isolation Detection Method for Cloud Platform.- A Behavioral Measurement Model Suitable for the Sensing Nodes of Internet of Things.- An Efficient and Revocable Decentralizing Attribute-Based Encryption for Mobile Cloud Computing.- A Voting Scheme in Blockchain Based on Threshold Group Signature.- HABKS: Hierarchical Attribute-Based Keyword Search on Outsourcing Data.- A Trusted Measurement Model for Mobile Internet.- A Fast Identity Authentication Solution for the Sensing Layer in Internet of Things.- Cryptanalysis of an ElGamal-like Cryptosystem Based on Matrices over Group Rings.- An Analysis About the Defects of Windows UAC Mechanism.- A Privacy Protection Scheme in VANETs Based on Group Signature.- Analysis of Wireless Sensor Networks Behavior for Trustworthiness Evaluation.- Digging Evidence for Violation of Cloud Security Compliance with Knowledge Learned from Logs.- Two Anti-Quantum Attack Protocols for Secure multiparty Computation.- A Cloud Storage Data Access Control Scheme Based on Attribute-Sets Encryption.- Detecting Malicious URLs Using a Deep Learning Approach Based on Stacked Denoising Autoencoder.- Predicting Vulnerable Software Components via Bellwethers.
| Erscheinungsdatum | 11.01.2019 |
|---|---|
| Reihe/Serie | Communications in Computer and Information Science ; 960 |
| Zusatzinfo | 60 Illustrations, color; 85 Illustrations, black and white; XII, 410 p. 145 illus., 60 illus. in color. |
| Verlagsort | Singapore |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Mathematik / Informatik ► Informatik ► Datenbanken |
| Informatik ► Netzwerke ► Sicherheit / Firewall | |
| Informatik ► Theorie / Studium ► Kryptologie | |
| Schlagworte | Applications • Computer Science • conference proceedings • Informatics • Research |
| ISBN-10 | 981-13-5912-1 / 9811359121 |
| ISBN-13 | 978-981-13-5912-5 / 9789811359125 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich