| Título : |
Security and Privacy in New Computing Environments : Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Wang, Ding, ; Meng, Weizhi, ; Han, Jinguang, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2021 |
| Número de páginas: |
XIII, 462 p. 122 ilustraciones, 108 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-3-030-66922-5 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Red informática Protección de datos Criptografía Cifrado de datos (Informática) Software de la aplicacion Seguridad móvil y de red Seguridad de datos e información Criptología Servicios de seguridad Aplicaciones informáticas y de sistemas de información |
| Índice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas de la Tercera Conferencia Internacional sobre Seguridad y Privacidad en Nuevos Entornos Informáticos, SPNCE 2020, celebrada en agosto de 2020. Debido a la pandemia de COVID-19, la conferencia se llevó a cabo de forma virtual. Los 31 artículos completos fueron seleccionados entre 63 presentaciones y están agrupados en temas sobre seguridad de redes; sistema de seguridad; aprendizaje automático; autenticación y control de acceso; seguridad en la nube; criptografía; criptografía aplicada. |
| Nota de contenido: |
Network Security -- A Characterisation of Smart Grid DoS Attacks -- Security and Privacy in 5G Applications: Challenges and Solutions -- Alarm Elements based Adaptive Network Security Situation Prediction Model -- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback -- System Security -- Research on IoT Security Technology and Standardization in the 5G Era -- MIMEC Based Information System Security Situation Assessment Model -- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings -- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain -- Machine Learning -- Research on a Hybrid EMD-SVR Model for Time Series Prediction -- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity -- User Identity Linkage across Social Networks based on Neural Tensor Network -- An Efficient and Privacy-Preserving Physiological Case Classification Scheme forE-healthcare System -- A multi-class detection system for Android malicious Apps based on color image features -- Authentication and Access Control -- PUF-based Two-factor Group Authentication in Smart Home -- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems -- Access Control for Wireless Body Area Networks -- FIDO - that dog won't hunt -- Blockchain-enabled user authentication in zero trust Internet of Things -- Cloud Security -- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage -- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain -- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data -- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration -- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing -- Cryptography -- Generative image steganography based on digital Cardan Grille -- Pixel Grouping Based Image Hashing for DIBR 3D Image -- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP -- Applied Cryptography -- A Verifiable Combinatorial Auction Scheme with Bidder's Privacy Protection -- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query -- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User -- A3BAC: Attribute-Based Access Control Model with Anonymous Access -- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid. |
| En línea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
Security and Privacy in New Computing Environments : Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings [documento electrónico] / Wang, Ding, ; Meng, Weizhi, ; Han, Jinguang, . - 1 ed. . - [s.l.] : Springer, 2021 . - XIII, 462 p. 122 ilustraciones, 108 ilustraciones en color. ISBN : 978-3-030-66922-5 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Red informática Protección de datos Criptografía Cifrado de datos (Informática) Software de la aplicacion Seguridad móvil y de red Seguridad de datos e información Criptología Servicios de seguridad Aplicaciones informáticas y de sistemas de información |
| Índice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas de la Tercera Conferencia Internacional sobre Seguridad y Privacidad en Nuevos Entornos Informáticos, SPNCE 2020, celebrada en agosto de 2020. Debido a la pandemia de COVID-19, la conferencia se llevó a cabo de forma virtual. Los 31 artículos completos fueron seleccionados entre 63 presentaciones y están agrupados en temas sobre seguridad de redes; sistema de seguridad; aprendizaje automático; autenticación y control de acceso; seguridad en la nube; criptografía; criptografía aplicada. |
| Nota de contenido: |
Network Security -- A Characterisation of Smart Grid DoS Attacks -- Security and Privacy in 5G Applications: Challenges and Solutions -- Alarm Elements based Adaptive Network Security Situation Prediction Model -- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback -- System Security -- Research on IoT Security Technology and Standardization in the 5G Era -- MIMEC Based Information System Security Situation Assessment Model -- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings -- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain -- Machine Learning -- Research on a Hybrid EMD-SVR Model for Time Series Prediction -- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity -- User Identity Linkage across Social Networks based on Neural Tensor Network -- An Efficient and Privacy-Preserving Physiological Case Classification Scheme forE-healthcare System -- A multi-class detection system for Android malicious Apps based on color image features -- Authentication and Access Control -- PUF-based Two-factor Group Authentication in Smart Home -- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems -- Access Control for Wireless Body Area Networks -- FIDO - that dog won't hunt -- Blockchain-enabled user authentication in zero trust Internet of Things -- Cloud Security -- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage -- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain -- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data -- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration -- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing -- Cryptography -- Generative image steganography based on digital Cardan Grille -- Pixel Grouping Based Image Hashing for DIBR 3D Image -- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP -- Applied Cryptography -- A Verifiable Combinatorial Auction Scheme with Bidder's Privacy Protection -- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query -- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User -- A3BAC: Attribute-Based Access Control Model with Anonymous Access -- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid. |
| En línea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |