Quality, Reliability, Security and Robustness in Heterogeneous Systems
Springer International Publishing (Verlag)
978-3-030-91423-3 (ISBN)
The 20 revised full papers were carefully reviewed and selected from 43 submissions. The papers are organized thematically in tracks Machine Learning in Distributed Networks; 5G Networks and Security; IoT Security and Lightweight Cryptography; Network Security; and Privacy-preserving Emerging Networked Applications.
Machine Learning in Distributed Networks.- FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation.- Accelerating TEE-based DNN Inference Using Mean Shift Network Pruning.- Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics.- Blockchain Networks and Blockchain-based Applications.- Blockchain for IoT : A Critical Analysis Concerning Performance and Scalability.- Toward Achieving Unanimity for Implicit Closings in a Trustless System.- DBS: Blockchain-based privacy-preserving RBAC in IoT.- 5G Networks and Security.- 8 A Lightweight Authentication Protocol for 5G Cellular Network Connected Drones.- Anti-eavesdropping Proportional Fairness Access Control for 5G Networks.- Joint Relay Selection and Frequency Allocationfor D2D Communications.- IoT Security and Lightweight Cryptography 11 Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security.- A UsabilityStudy of Cryptographic API Design.- An S-box Design using Irreducible Polynomial with Affine Transformation for Lightweight Cipher.- The Phantom Gradient Attack: A Study Of Replacement Functions For The XOR Function.- Network Security 15 Topology Validator - Defense against Topology Poisoning Attack in SDN.- Towards an Attention-based Accurate Intrusion Detection Approach.- Avoiding VPN Bottlenecks: Exploring Network-Level client Identity Validation Options.- Privacy-preserving Emerging Networked Applications.- Privacy-Preserving Ranked Searchable Encryption Based on Differential Privacy.- Memory-efficient Encrypted Search using Trusted Execution Environment Viet Vo.
| Erscheinungsdatum | 18.11.2021 |
|---|---|
| Reihe/Serie | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
| Zusatzinfo | XI, 353 p. 29 illus. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 563 g |
| Themenwelt | Mathematik / Informatik ► Informatik ► Netzwerke |
| Schlagworte | Access Control • Applications • authentication • Communication Systems • Computer Hardware • Computer Networks • Computer Science • Computer Security • Computer systems • conference proceedings • cryptography • Data communication systems • Data Security • Engineering • Informatics • Internet • Mathematics • Network Protocols • Network Security • Research • Signal Processing • Telecommunication networks • Telecommunication Systems • telecommunication traffic |
| ISBN-10 | 3-030-91423-2 / 3030914232 |
| ISBN-13 | 978-3-030-91423-3 / 9783030914233 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich