Información del autor
Autor Liu, Joseph K. |
Documentos disponibles escritos por este autor (4)
Crear una solicitud de compra Refinar búsqueda
Information Security / Liu, Joseph K. ; Katsikas, Sokratis ; Meng, Weizhi ; Susilo, Willy ; Intan, Rolly
TÃtulo : Information Security : 24th International Conference, ISC 2021, Virtual Event, November 10–12, 2021, Proceedings / Tipo de documento: documento electrónico Autores: Liu, Joseph K., ; Katsikas, Sokratis, ; Meng, Weizhi, ; Susilo, Willy, ; Intan, Rolly, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2021 Número de páginas: XIII, 416 p. 102 ilustraciones, 77 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-91356-4 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Protección de datos Seguridad de datos e información Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas de la 24.ª Conferencia Internacional sobre Seguridad de la Información, ISC 2021, celebrada virtualmente en noviembre de 2021. Los 21 artÃculos completos presentados en este volumen fueron cuidadosamente revisados ​​y seleccionados entre 87 presentaciones. Los artÃculos se clasificaron en los siguientes subtÃtulos temáticos: criptologÃa; seguridad web y del sistema operativo; Seguridad de la red; detección de malware, ataques y vulnerabilidades; y aprendizaje automático para la seguridad. . Nota de contenido: Cryptology -- Integer LWE with Non-Subgaussian Error and Related Attacks -- Layering Quantum-Resistance into Classical Digital Signature Algorithms -- Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits -- Cryptanalysis of Two White-Box Implementations of the SM4 Block Cipher -- A Non-Interactive Multi-User Protocol for Private Authorised Query Processing on Genomic Data -- Bigdata-facilitated Two-party Authenticated Key Exchange for IoT -- Randomized Component Based Secure Secret Reconstruction in Insecure Networks -- Transparency order of (n,m)-functions — its further characterization and applications -- Web and OS security -- Browserprint: An Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy -- TridentShell: A Covert and Scalable Backdoor Injection -- Andromeda: Enabling Secure Enclaves For The Android Ecosystem -- Network security -- FEX – A feature extractor for real-time IDS -- Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification -- Detection of malware, attacks and vulnerabilities -- Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic -- A Novel Behavioural Screenlogger Detection System -- DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning -- DVul-WLG: Graph Embedding Network Based on Code Similarity for Cross-architecture Firmware Vulnerability Detection -- Machine learning for security -- Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks -- Targeted Universal Adversarial Perturbations for Automatic Speech Recognition -- Voxstructor: Voice Reconstruction from Voiceprint -- Word-Map: Using Community Detection Algorithm to Detect AGDs. Tipo de medio : Computadora Summary : This book constitutes the proceedings of the 24rd International Conference on Information Security, ISC 2021, held virtually, in November 2021. The 21 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers categorized into the following topical subheadings: cryptology; web and OS security; network security; detection of malware, attacks and vulnerabilities; and machine learning for security. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Information Security : 24th International Conference, ISC 2021, Virtual Event, November 10–12, 2021, Proceedings / [documento electrónico] / Liu, Joseph K., ; Katsikas, Sokratis, ; Meng, Weizhi, ; Susilo, Willy, ; Intan, Rolly, . - 1 ed. . - [s.l.] : Springer, 2021 . - XIII, 416 p. 102 ilustraciones, 77 ilustraciones en color.
ISBN : 978-3-030-91356-4
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Protección de datos Seguridad de datos e información Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas de la 24.ª Conferencia Internacional sobre Seguridad de la Información, ISC 2021, celebrada virtualmente en noviembre de 2021. Los 21 artÃculos completos presentados en este volumen fueron cuidadosamente revisados ​​y seleccionados entre 87 presentaciones. Los artÃculos se clasificaron en los siguientes subtÃtulos temáticos: criptologÃa; seguridad web y del sistema operativo; Seguridad de la red; detección de malware, ataques y vulnerabilidades; y aprendizaje automático para la seguridad. . Nota de contenido: Cryptology -- Integer LWE with Non-Subgaussian Error and Related Attacks -- Layering Quantum-Resistance into Classical Digital Signature Algorithms -- Cryptanalysis of RSA Variants with Primes Sharing Most Significant Bits -- Cryptanalysis of Two White-Box Implementations of the SM4 Block Cipher -- A Non-Interactive Multi-User Protocol for Private Authorised Query Processing on Genomic Data -- Bigdata-facilitated Two-party Authenticated Key Exchange for IoT -- Randomized Component Based Secure Secret Reconstruction in Insecure Networks -- Transparency order of (n,m)-functions — its further characterization and applications -- Web and OS security -- Browserprint: An Analysis of the Impact of Browser Features on Fingerprintability and Web Privacy -- TridentShell: A Covert and Scalable Backdoor Injection -- Andromeda: Enabling Secure Enclaves For The Android Ecosystem -- Network security -- FEX – A feature extractor for real-time IDS -- Identifying Malicious DNS Tunnel Tools from DoH Traffic Using Hierarchical Machine Learning Classification -- Detection of malware, attacks and vulnerabilities -- Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic -- A Novel Behavioural Screenlogger Detection System -- DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning -- DVul-WLG: Graph Embedding Network Based on Code Similarity for Cross-architecture Firmware Vulnerability Detection -- Machine learning for security -- Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks -- Targeted Universal Adversarial Perturbations for Automatic Speech Recognition -- Voxstructor: Voice Reconstruction from Voiceprint -- Word-Map: Using Community Detection Algorithm to Detect AGDs. Tipo de medio : Computadora Summary : This book constitutes the proceedings of the 24rd International Conference on Information Security, ISC 2021, held virtually, in November 2021. The 21 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers categorized into the following topical subheadings: cryptology; web and OS security; network security; detection of malware, attacks and vulnerabilities; and machine learning for security. . Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]
TÃtulo : Information Security and Privacy : 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings / Tipo de documento: documento electrónico Autores: Liu, Joseph K., ; Cui, Hui, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2020 Número de páginas: XVI, 676 p. 344 ilustraciones, 71 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-55304-3 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Entornos informáticos Red informática Servicios de seguridad Seguridad móvil y de red Redes de comunicación informática Protección de datos Ordenador Seguridad de datos e información Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas arbitradas de la 25.ª Conferencia de Australasia sobre Seguridad y Privacidad de la Información, ACISP 2020, celebrada en Perth, WA, Australia, en noviembre de 2020*. Los 31 artÃculos completos revisados ​​y los 5 artÃculos breves presentados fueron cuidadosamente revisados ​​y seleccionados entre 151 presentaciones. Los artÃculos presentan y analizan las últimas investigaciones, tendencias, avances y desafÃos en el ámbito de la seguridad de la información, la privacidad y la ciberseguridad en una variedad de temas como la criptografÃa poscuántica; cifrado simétrico; firma; seguridad de red y blockchain; primitivas criptográficas; fundamento matemático; seguridad del aprendizaje automático, entre otros. *La conferencia se llevó a cabo virtualmente debido a la pandemia de COVID-19. Nota de contenido: Post-Quantum Cryptography -- Symmetric Cipher -- Signature -- Network Security and Blockchain -- Cryptographic Primitives -- Mathematical Foundation -- Machine Learning Security -- Attack -- Privacy -- Short Papers. Tipo de medio : Computadora Summary : This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*. The 31 revised full papers and 5 short papers presented were carefully revised and selected from 151 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as post-quantum cryptography; symmetric cipher; signature; network security and blockchain; cryptographic primitives; mathematical foundation; machine learning security, among others. *The conference was held virtually due to COVID-19 pandemic. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Information Security and Privacy : 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020, Proceedings / [documento electrónico] / Liu, Joseph K., ; Cui, Hui, . - 1 ed. . - [s.l.] : Springer, 2020 . - XVI, 676 p. 344 ilustraciones, 71 ilustraciones en color.
ISBN : 978-3-030-55304-3
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Entornos informáticos Red informática Servicios de seguridad Seguridad móvil y de red Redes de comunicación informática Protección de datos Ordenador Seguridad de datos e información Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas arbitradas de la 25.ª Conferencia de Australasia sobre Seguridad y Privacidad de la Información, ACISP 2020, celebrada en Perth, WA, Australia, en noviembre de 2020*. Los 31 artÃculos completos revisados ​​y los 5 artÃculos breves presentados fueron cuidadosamente revisados ​​y seleccionados entre 151 presentaciones. Los artÃculos presentan y analizan las últimas investigaciones, tendencias, avances y desafÃos en el ámbito de la seguridad de la información, la privacidad y la ciberseguridad en una variedad de temas como la criptografÃa poscuántica; cifrado simétrico; firma; seguridad de red y blockchain; primitivas criptográficas; fundamento matemático; seguridad del aprendizaje automático, entre otros. *La conferencia se llevó a cabo virtualmente debido a la pandemia de COVID-19. Nota de contenido: Post-Quantum Cryptography -- Symmetric Cipher -- Signature -- Network Security and Blockchain -- Cryptographic Primitives -- Mathematical Foundation -- Machine Learning Security -- Attack -- Privacy -- Short Papers. Tipo de medio : Computadora Summary : This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP 2020, held in Perth, WA, Australia, in November 2020*. The 31 revised full papers and 5 short papers presented were carefully revised and selected from 151 submissions. The papers present and discuss the latest research, trends, breakthroughs, and challenges in the domain of information security, privacy and cybersecurity on a variety of topics such as post-quantum cryptography; symmetric cipher; signature; network security and blockchain; cryptographic primitives; mathematical foundation; machine learning security, among others. *The conference was held virtually due to COVID-19 pandemic. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]
TÃtulo : Information Security Practice and Experience : 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedings / Tipo de documento: documento electrónico Autores: Liu, Joseph K., ; Samarati, Pierangela, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2017 Número de páginas: XVI, 907 p. 211 ilustraciones ISBN/ISSN/DL: 978-3-319-72359-4 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: CriptografÃa TecnologÃa de la información Aspectos Legales de la Computación Computadoras y sociedad Redes de comunicación informática CriptologÃa Ordenador Cifrado de datos (Informática) Red informática Protección de datos Seguridad de datos e Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas de la 13.ª Conferencia Internacional sobre Seguridad de la Información, Práctica y Experiencia, ISPEC 2017, celebrada en Melbourne, Australia, en diciembre de 2017. Los 34 artÃculos completos y 14 breves presentados junto con 9 artÃculos del SocialSec Track en este volumen fueron cuidadosamente revisados ​​y seleccionados entre 105 presentaciones. Los artÃculos cubren temas como blockchain, cifrado asimétrico, cifrado simétrico, criptografÃa basada en celosÃa, cifrado con capacidad de búsqueda, firma, autenticación, seguridad en la nube, seguridad de red, seguridad ciberfÃsica, seguridad de redes sociales y códigos QR, seguridad de software e informática confiable. y pista de SocialSec. Nota de contenido: Blockchain -- Asymmetric encryption -- Symmetric encryption -- Lattice-based cryptography -- Searchable encryption -- Signature -- Authentication -- Cloud security -- Network security -- Cyber-physical security -- Social network and QR code security -- Software security and trusted computing.- SocialSec track. Tipo de medio : Computadora Summary : This book constitutes the proceedings of the 13th International Conference on Information Security and Practice and Experience, ISPEC 2017, held in Melbourne, Australia, in December 2017. The 34 full and 14 short papers presented together with 9 papers from the SocialSec Track in this volume were carefully reviewed and selected from 105 submissions. The papers cover topics such as blockchain, asymmetric encryption, symmetric encryption, lattice-based cryptography, searchable encryption, signature, authentication, cloud security, network security, cyber-physical security, social network and QR code security, software security and trusted computing, and SocialSec track. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Information Security Practice and Experience : 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedings / [documento electrónico] / Liu, Joseph K., ; Samarati, Pierangela, . - 1 ed. . - [s.l.] : Springer, 2017 . - XVI, 907 p. 211 ilustraciones.
ISBN : 978-3-319-72359-4
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: CriptografÃa TecnologÃa de la información Aspectos Legales de la Computación Computadoras y sociedad Redes de comunicación informática CriptologÃa Ordenador Cifrado de datos (Informática) Red informática Protección de datos Seguridad de datos e Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas de la 13.ª Conferencia Internacional sobre Seguridad de la Información, Práctica y Experiencia, ISPEC 2017, celebrada en Melbourne, Australia, en diciembre de 2017. Los 34 artÃculos completos y 14 breves presentados junto con 9 artÃculos del SocialSec Track en este volumen fueron cuidadosamente revisados ​​y seleccionados entre 105 presentaciones. Los artÃculos cubren temas como blockchain, cifrado asimétrico, cifrado simétrico, criptografÃa basada en celosÃa, cifrado con capacidad de búsqueda, firma, autenticación, seguridad en la nube, seguridad de red, seguridad ciberfÃsica, seguridad de redes sociales y códigos QR, seguridad de software e informática confiable. y pista de SocialSec. Nota de contenido: Blockchain -- Asymmetric encryption -- Symmetric encryption -- Lattice-based cryptography -- Searchable encryption -- Signature -- Authentication -- Cloud security -- Network security -- Cyber-physical security -- Social network and QR code security -- Software security and trusted computing.- SocialSec track. Tipo de medio : Computadora Summary : This book constitutes the proceedings of the 13th International Conference on Information Security and Practice and Experience, ISPEC 2017, held in Melbourne, Australia, in December 2017. The 34 full and 14 short papers presented together with 9 papers from the SocialSec Track in this volume were carefully reviewed and selected from 105 submissions. The papers cover topics such as blockchain, asymmetric encryption, symmetric encryption, lattice-based cryptography, searchable encryption, signature, authentication, cloud security, network security, cyber-physical security, social network and QR code security, software security and trusted computing, and SocialSec track. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]
TÃtulo : Network and System Security : 13th International Conference, NSS 2019, Sapporo, Japan, December 15À“18, 2019, Proceedings / Tipo de documento: documento electrónico Autores: Liu, Joseph K., ; Huang, Xinyi, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2019 Número de páginas: XIII, 731 p. 264 ilustraciones, 143 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-36938-5 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Protección de datos CriptografÃa Cifrado de datos (Informática) IngenierÃa Informática Red de computadoras Inteligencia artificial Software de la aplicacion Seguridad de datos e información CriptologÃa IngenierÃa Informática y Redes Aplicaciones informáticas y de sistemas de información Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas de la 13.ª Conferencia Internacional sobre Seguridad de Redes y Sistemas, NSS 2019, celebrada en Sapporo, Japón, en diciembre de 2019. Los 36 artÃculos completos y 7 artÃculos breves presentados junto con 4 artÃculos invitados en este libro fueron cuidadosamente revisados ​​y seleccionado entre 89 presentaciones iniciales. Los artÃculos cubren una amplia gama de temas en el campo, incluida la autenticación, el control de acceso, la disponibilidad, la integridad, la privacidad, la confidencialidad, la confiabilidad y la sostenibilidad de las redes y sistemas informáticos. Nota de contenido: Invited Papers -- Measuring Security of Symmetric Encryption Schemes against On-the-Fly Side-Channel Key-Recovery Attacks -- Unsupervised Insider Detection through Neural Feature Learning and Model Optimisation -- Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey -- A Graph Database-based Approach to Analyze Network Log Files -- Full Papers -- A Privacy-Enhancing Framework for Internet of Things Services -- Using Audio Characteristics for Mobile Device Authentication -- Ethereum Analysis via Node Clustering -- Strong Known Related-Key Attacks and the Security of ECDSA -- Threat Assessment of Enterprise Applications via Graphical Modelling -- A Blockchain-based IoT Data Management System for Secure and Scalable Data Sharing -- Towards Secure Open Banking Architecture: An Evaluation with OWASP -- OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms -- OVERSCAN: OAuth 2.0 Scanner for Missing Parameters -- LaT-Voting: Traceable Anonymous E-Voting on Blockchain -- Distributed Secure Storage System Based on Blockchain and TPA -- SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique -- A Practical Dynamic Enhanced BFT protocol -- Pre-adjustment Based Anti-collusion Mechanism for Audio Signals -- Detecting Intruders by User File Access Patterns -- Blockchain-enabled Privacy-preserving Internet of Vehicles: Decentralized and Reputation-based Network Architecture -- Privacy Preserving Machine Learning with Limited Information Leakage -- Blockchain based Owner-Controlled Secure Software Updates for Resource-Constrained -- Sequential Aggregate MACs with Detecting Functionality Revisited -- A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System -- EEG-based Authentication with Variational Universal Background Model -- An Efficient Vulnerability Detection Model for Ethereum Smart Contracts -- A Comparative Study on Network Traffic Clustering -- Tell Them From Me: an Encrypted Application Profiler -- Indoor Security Localization Algorithm Based on Location Discrimination Ability of AP -- Gnocchi: Multiplexed Payment Channels for Cryptocurrencies -- Difficulty of decentralized structure due to rational user behavior on Blockchain -- A DNS Tunneling Detection method based on Deep Learning models to prevent Data Exfiltration -- Cryptanalysis of Raindrop and FBC -- Attribute Based Encryption with Publicly Verifiable Outsourced Decryption -- New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defense Cost -- Lattice based verifiably encrypted double authentication preventing Signatures -- Privacy-Preserving Sequential Data Publishing -- A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter -- Keyed Non-Parametric Hypothesis Tests: Protecting Machine Learning From Poisoning Attacks -- SparkDA: RDD-Based High Performance Data AnonymizationTechnique for Spark Platform -- Short Papers -- An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol -- Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices -- Privacy-preserving k-means clustering: an application to driving style Recognition -- Derandomized PACE with Mutual Authentication -- A Muti-attributes-based Trust Model of Internet of Vehicle -- Using Sparse Composite Document Vectors to Classify VBA Macros -- A High-Performance Hybrid Blockchain Systemfor Traceable IoT Applications. Tipo de medio : Computadora Summary : This book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019. The 36 full papers and 7 short papers presented together with 4 invited papers in this book were carefully reviewed and selected from 89 initial submissions. The papers cover a wide range of topics in the field, including authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Network and System Security : 13th International Conference, NSS 2019, Sapporo, Japan, December 15À“18, 2019, Proceedings / [documento electrónico] / Liu, Joseph K., ; Huang, Xinyi, . - 1 ed. . - [s.l.] : Springer, 2019 . - XIII, 731 p. 264 ilustraciones, 143 ilustraciones en color.
ISBN : 978-3-030-36938-5
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Protección de datos CriptografÃa Cifrado de datos (Informática) IngenierÃa Informática Red de computadoras Inteligencia artificial Software de la aplicacion Seguridad de datos e información CriptologÃa IngenierÃa Informática y Redes Aplicaciones informáticas y de sistemas de información Clasificación: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas de la 13.ª Conferencia Internacional sobre Seguridad de Redes y Sistemas, NSS 2019, celebrada en Sapporo, Japón, en diciembre de 2019. Los 36 artÃculos completos y 7 artÃculos breves presentados junto con 4 artÃculos invitados en este libro fueron cuidadosamente revisados ​​y seleccionado entre 89 presentaciones iniciales. Los artÃculos cubren una amplia gama de temas en el campo, incluida la autenticación, el control de acceso, la disponibilidad, la integridad, la privacidad, la confidencialidad, la confiabilidad y la sostenibilidad de las redes y sistemas informáticos. Nota de contenido: Invited Papers -- Measuring Security of Symmetric Encryption Schemes against On-the-Fly Side-Channel Key-Recovery Attacks -- Unsupervised Insider Detection through Neural Feature Learning and Model Optimisation -- Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey -- A Graph Database-based Approach to Analyze Network Log Files -- Full Papers -- A Privacy-Enhancing Framework for Internet of Things Services -- Using Audio Characteristics for Mobile Device Authentication -- Ethereum Analysis via Node Clustering -- Strong Known Related-Key Attacks and the Security of ECDSA -- Threat Assessment of Enterprise Applications via Graphical Modelling -- A Blockchain-based IoT Data Management System for Secure and Scalable Data Sharing -- Towards Secure Open Banking Architecture: An Evaluation with OWASP -- OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms -- OVERSCAN: OAuth 2.0 Scanner for Missing Parameters -- LaT-Voting: Traceable Anonymous E-Voting on Blockchain -- Distributed Secure Storage System Based on Blockchain and TPA -- SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique -- A Practical Dynamic Enhanced BFT protocol -- Pre-adjustment Based Anti-collusion Mechanism for Audio Signals -- Detecting Intruders by User File Access Patterns -- Blockchain-enabled Privacy-preserving Internet of Vehicles: Decentralized and Reputation-based Network Architecture -- Privacy Preserving Machine Learning with Limited Information Leakage -- Blockchain based Owner-Controlled Secure Software Updates for Resource-Constrained -- Sequential Aggregate MACs with Detecting Functionality Revisited -- A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System -- EEG-based Authentication with Variational Universal Background Model -- An Efficient Vulnerability Detection Model for Ethereum Smart Contracts -- A Comparative Study on Network Traffic Clustering -- Tell Them From Me: an Encrypted Application Profiler -- Indoor Security Localization Algorithm Based on Location Discrimination Ability of AP -- Gnocchi: Multiplexed Payment Channels for Cryptocurrencies -- Difficulty of decentralized structure due to rational user behavior on Blockchain -- A DNS Tunneling Detection method based on Deep Learning models to prevent Data Exfiltration -- Cryptanalysis of Raindrop and FBC -- Attribute Based Encryption with Publicly Verifiable Outsourced Decryption -- New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defense Cost -- Lattice based verifiably encrypted double authentication preventing Signatures -- Privacy-Preserving Sequential Data Publishing -- A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter -- Keyed Non-Parametric Hypothesis Tests: Protecting Machine Learning From Poisoning Attacks -- SparkDA: RDD-Based High Performance Data AnonymizationTechnique for Spark Platform -- Short Papers -- An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol -- Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices -- Privacy-preserving k-means clustering: an application to driving style Recognition -- Derandomized PACE with Mutual Authentication -- A Muti-attributes-based Trust Model of Internet of Vehicle -- Using Sparse Composite Document Vectors to Classify VBA Macros -- A High-Performance Hybrid Blockchain Systemfor Traceable IoT Applications. Tipo de medio : Computadora Summary : This book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019. The 36 full papers and 7 short papers presented together with 4 invited papers in this book were carefully reviewed and selected from 89 initial submissions. The papers cover a wide range of topics in the field, including authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]