ISBN: 9783319462981
Computer Science; Systems and Data Security; Data Encryption; Computer Communication Networks; Management of Computing and Information Systems; Computers and Society; Information Systems … Mehr…
Springer.com Versandkosten:zzgl. Versandkosten Details... |
ISBN: 9783319462981
Computer Science; Systems and Data Security; Data Encryption; Computer Communication Networks; Management of Computing and Information Systems; Computers and Society; Information Systems … Mehr…
Springer.com Versandkosten:zzgl. Versandkosten. Details... |
2016, ISBN: 9783319462981
Network and System Security:10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings Network and System Security:10th International Conference, NSS 2016… Mehr…
Hugendubel.de No. 27952355 Versandkosten:zzgl. Versandkosten Details... |
2016, ISBN: 9783319462981
10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings, eBooks, eBook Download (PDF), [PU: Springer International Publishing], Springer International … Mehr…
lehmanns.de Versandkosten:Download sofort lieferbar. (EUR 0.00) Details... |
2016, ISBN: 9783319462981
10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings, eBook Download (PDF), eBooks, [PU: Springer International Publishing]
lehmanns.de Versandkosten:Download sofort lieferbar, , Versandkostenfrei innerhalb der BRD. (EUR 0.00) Details... |
ISBN: 9783319462981
Computer Science; Systems and Data Security; Data Encryption; Computer Communication Networks; Management of Computing and Information Systems; Computers and Society; Information Systems … Mehr…
ISBN: 9783319462981
Computer Science; Systems and Data Security; Data Encryption; Computer Communication Networks; Management of Computing and Information Systems; Computers and Society; Information Systems … Mehr…
2016
ISBN: 9783319462981
Network and System Security:10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings Network and System Security:10th International Conference, NSS 2016… Mehr…
2016, ISBN: 9783319462981
10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings, eBooks, eBook Download (PDF), [PU: Springer International Publishing], Springer International … Mehr…
2016, ISBN: 9783319462981
10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings, eBook Download (PDF), eBooks, [PU: Springer International Publishing]
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Network and System Security
EAN (ISBN-13): 9783319462981
Erscheinungsjahr: 2016
Herausgeber: Springer International Publishing
Buch in der Datenbank seit 2017-04-17T04:34:08+02:00 (Vienna)
Detailseite zuletzt geändert am 2022-01-06T02:33:15+01:00 (Vienna)
ISBN/EAN: 9783319462981
ISBN - alternative Schreibweisen:
978-3-319-46298-1
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: chen chunhua, yung
Daten vom Verlag:
Autor/in: Jiageng Chen; Vincenzo Piuri; Chunhua Su; Moti Yung
Titel: Security and Cryptology; Lecture Notes in Computer Science; Network and System Security - 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings
Verlag: Springer; Springer International Publishing
540 Seiten
Erscheinungsjahr: 2016-09-20
Cham; CH
Sprache: Englisch
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XIV, 540 p. 128 illus.
EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Computersicherheit; Verstehen; access control; authentication; cloud computing; computer crime; computer forensics; cryptography; data mining; digital signatures; encryption; information retrieval; machine learning; mobile computing; network security; public key cryptography; security; security protocols; system security; telecommunication networks; user privacy; World Wide Web; C; Data and Information Security; Cryptology; Computer Communication Networks; IT Operations; Computers and Society; Computer Science; Netzwerksicherheit; Kodierungstheorie und Verschlüsselung (Kryptologie); Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Wirtschaftsmathematik und -informatik, IT-Management; Digital- und Informationstechnologien: soziale und ethische Aspekte; BC
Invited paper.- While Mobile Encounters with Clouds.- Authentication Mechanism.- Multi-Device Anonymous Authentication.- A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism.- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications.- Cloud Computing Security.- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing.- An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments.- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms.- Data Mining for Security Application.- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security.- Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade.- Digital Signature.- Two-in-One Oblivious Signatures Secure in the Random Oracle Model.- A New Transitive Signature Scheme.- Privacy-preserving Technologies.- Privacy-Preserving Profile Matching Protocol Considering Conditions.- Privacy Preserving Credit Systems.- Evading System-Calls Based Intrusion Detection Systems.- Network Security and Forensic.- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks.- A Network Timestamp Verification Mechanism for Forensic Analysis.- Searchable Encryption.- An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords.- Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards.- A System of Shareable Keyword Search on Encrypted Data.- Security Policy and Access Control.- An Attribute Based Protection Model for JSON Documents.- The GURA-G Administrative Model for User and Group Attribute Assignment.-On the relationship between finite domain ABAM and PreUCONA.- Security Protocols.- MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication.- Expressive Rating Scheme by Signatures with Predications on Ratees.- Symmetric Key Cryptography.- A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers.- Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR.- System Security.- DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern.- PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks.- Iris Cancellable Template Generation based on Indexing-First-One Hashing.- Web Security.- Detecting Malicious URLs Using Lexical Analysis.- Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo.- Data Mining for Security Application (Short Paper).- Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining.- Provable Seucirty (Short Paper).- Improved Security Proofs for Modular Exponentiation Bits.- Security Protocol (Short Paper).- Secure Outsourced Bilinear Pairings Computation for Mobile Devices.- The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix.
Includes supplementary material: sn.pub/extras
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
2900124166898 Network and System Security (John R. Vacca)
< zum Archiv...