| Título : |
Trusted Computing and Information Security : 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers |
| Tipo de documento: |
documento electrónico |
| Autores: |
Zhang, Huanguo, ; Zhao, Bo, ; Yan, Fei, |
| Mención de edición: |
1 ed. |
| Editorial: |
Singapore [Malasya] : Springer |
| Fecha de publicación: |
2019 |
| Número de páginas: |
XII, 410 p. 145 ilustraciones, 60 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-981-1359132-- |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Protección de datos Criptografía Cifrado de datos (Informática) Software de la aplicacion Red de computadoras Seguridad de datos e información Criptología Servicios de seguridad Aplicaciones informáticas y de sistemas de información Redes de comunicación informática |
| Índice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas de la Conferencia China sobre Computación Confiable y Seguridad de la Información, CTCIS 2018, celebrada en Wuhan, China, en octubre de 2018. Los 24 artículos completos revisados presentados fueron cuidadosamente revisados y seleccionados entre 73 presentaciones. Los artículos se centran en criptografía, seguridad de sistemas, informática confiable, seguridad de la información y seguridad de redes. |
| Nota de contenido: |
Ciphertext-Policy Attribute-Based Encryption for Circuits from Lattices under Weak Security Model -- Impossible Differential Cryptanalysis of SPECK -- Detect Peer-To-Peer Botnet with Permutation Entropy and Adaptive Information Fusion -- Research of Snort Rule Extension and APT Detection Based on APT Network Behavior Analysis -- Network Risk Assessment Method Based on Asset Correlation Graph -- Password Guessing Based on Semantic Analysis and Neural Networks -- An Approach of Implementing SW-TPM in Real-Time Operating System -- A Multilevel Trusted Clustering Mechanism for the Awareness Layer of the Internet of Things -- A Multi-Layer Virtual Network Isolation Detection Method for Cloud Platform -- A Behavioral Measurement Model Suitable for the Sensing Nodes of Internet of Things -- An Efficient and Revocable Decentralizing Attribute-Based Encryption for Mobile Cloud Computing -- A Voting Scheme in Blockchain Based on Threshold Group Signature -- HABKS: Hierarchical Attribute-Based Keyword Search on Outsourcing Data -- A Trusted Measurement Model for Mobile Internet -- A Fast Identity Authentication Solution for the Sensing Layer in Internet of Things -- Cryptanalysis of an ElGamal-like Cryptosystem Based on Matrices over Group Rings -- An Analysis About the Defects of Windows UAC Mechanism -- A Privacy Protection Scheme in VANETs Based on Group Signature -- Analysis of Wireless Sensor Networks Behavior for Trustworthiness Evaluation -- Digging Evidence for Violation of Cloud Security Compliance with Knowledge Learned from Logs -- Two Anti-Quantum Attack Protocols for Secure multiparty Computation -- A Cloud Storage Data Access Control Scheme Based on Attribute-Sets Encryption -- Detecting Malicious URLs Using a Deep Learning Approach Based on Stacked Denoising Autoencoder -- Predicting Vulnerable Software Components via Bellwethers. |
| En línea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
Trusted Computing and Information Security : 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers [documento electrónico] / Zhang, Huanguo, ; Zhao, Bo, ; Yan, Fei, . - 1 ed. . - Singapore [Malasya] : Springer, 2019 . - XII, 410 p. 145 ilustraciones, 60 ilustraciones en color. ISBN : 978-981-1359132-- Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Protección de datos Criptografía Cifrado de datos (Informática) Software de la aplicacion Red de computadoras Seguridad de datos e información Criptología Servicios de seguridad Aplicaciones informáticas y de sistemas de información Redes de comunicación informática |
| Índice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas de la Conferencia China sobre Computación Confiable y Seguridad de la Información, CTCIS 2018, celebrada en Wuhan, China, en octubre de 2018. Los 24 artículos completos revisados presentados fueron cuidadosamente revisados y seleccionados entre 73 presentaciones. Los artículos se centran en criptografía, seguridad de sistemas, informática confiable, seguridad de la información y seguridad de redes. |
| Nota de contenido: |
Ciphertext-Policy Attribute-Based Encryption for Circuits from Lattices under Weak Security Model -- Impossible Differential Cryptanalysis of SPECK -- Detect Peer-To-Peer Botnet with Permutation Entropy and Adaptive Information Fusion -- Research of Snort Rule Extension and APT Detection Based on APT Network Behavior Analysis -- Network Risk Assessment Method Based on Asset Correlation Graph -- Password Guessing Based on Semantic Analysis and Neural Networks -- An Approach of Implementing SW-TPM in Real-Time Operating System -- A Multilevel Trusted Clustering Mechanism for the Awareness Layer of the Internet of Things -- A Multi-Layer Virtual Network Isolation Detection Method for Cloud Platform -- A Behavioral Measurement Model Suitable for the Sensing Nodes of Internet of Things -- An Efficient and Revocable Decentralizing Attribute-Based Encryption for Mobile Cloud Computing -- A Voting Scheme in Blockchain Based on Threshold Group Signature -- HABKS: Hierarchical Attribute-Based Keyword Search on Outsourcing Data -- A Trusted Measurement Model for Mobile Internet -- A Fast Identity Authentication Solution for the Sensing Layer in Internet of Things -- Cryptanalysis of an ElGamal-like Cryptosystem Based on Matrices over Group Rings -- An Analysis About the Defects of Windows UAC Mechanism -- A Privacy Protection Scheme in VANETs Based on Group Signature -- Analysis of Wireless Sensor Networks Behavior for Trustworthiness Evaluation -- Digging Evidence for Violation of Cloud Security Compliance with Knowledge Learned from Logs -- Two Anti-Quantum Attack Protocols for Secure multiparty Computation -- A Cloud Storage Data Access Control Scheme Based on Attribute-Sets Encryption -- Detecting Malicious URLs Using a Deep Learning Approach Based on Stacked Denoising Autoencoder -- Predicting Vulnerable Software Components via Bellwethers. |
| En línea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |