Frontiers in Cyber Security
Springer Nature Switzerland AG (Verlag)
978-981-96-0153-0 (ISBN)
- Titel nicht im Sortiment
- Artikel merken
This two-volume set, CCIS 2315 and CCIS 2316, constitutes the refereed proceedings of the 7th International Conference on Frontiers in Cyber Security, FCS 2024 held in Chongqing, China, during July 26-28, 2024.
The 47 full papers presented in these two volumes were carefully reviewed and selected from 121 submissions.
The papers are organized in the following topical sections:
Part I: Machine Learning and Differential Privacy; Federated Learning; Privacy-Preserving Services; Blockchain and Distributed System; Public-Key Cryptography; Multi-Party Computation.
Part II: Multi-Party Computation; Smart Grid; Authentication and Deduplication.
.- Multi-Party Computation.
.- A Semi-Centralized Dynamic Session Key Agreement Protocol based on CL-PKC for In-vehicle Network.
.- A Novel Multi-user Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things.
.- Practical Third-party Private Set Intersection Protocol from Homomorphic Encryption.
.- Smart Grid.
.- A Multidimensional Data Aggregation Scheme with Anonymous and Demand-response Billing.
.- Achieving Secure and Efficient Multi-layer Data Sharing for Smart Grid.
.- Vulnerability Detection for Open Source Components in Smart Power Grid.
.- Addressing Economic Dispatch Problem in a Smart Grid: A Privacy-Preserving and Distributed Optimization Approach.
.- A Multi-Dimensional Data Aggregation Signcryption Scheme with Anonymity in the Smart Grid.
.- Authentication and Deduplication.
.- A Novel Anonymous Authentication Key Agreement Protocol in Satellite Terrestrial Networks.
.- An Asynchronous Group Key Exchange Protocol with Threshold Join Function for Internet of Vehicles.
.- A PUF-based Lightweight Mutual Authentication Scheme for IoT Devices.
.- BFDup: Batch Fuzzy Deduplication Scheme for Massive Data in Non-trusted Environments.
.- Secure Encrypted Deduplication Based on Frequency Distribution.
.- Enhanced IoT Security: A Blockchain and Chameleon Hashing-Based Scheme for Authentication.
.- A Blockchain-based Anonymous Authentication Scheme for Medical Security.
| Erscheinungsdatum | 27.12.2024 |
|---|---|
| Reihe/Serie | Communications in Computer and Information Science |
| Zusatzinfo | 68 Illustrations, color; 18 Illustrations, black and white; XVI, 273 p. 86 illus., 68 illus. in color. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Informatik ► Theorie / Studium ► Künstliche Intelligenz / Robotik | |
| Technik | |
| Schlagworte | authentication • Blockchain • differential privacy • Distributed system • federated learning • machine learning • Multi-Party Computation • Privacy-preserving Services • Public Key Cryptography • Smart Grid |
| ISBN-10 | 981-96-0153-3 / 9819601533 |
| ISBN-13 | 978-981-96-0153-0 / 9789819601530 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich