Autor Yan, Zheng
|
|
Documentos disponibles escritos por este autor (4)
Hacer una sugerencia Refinar búsqueda11th International Conference, NSS 2017, Helsinki, Finland, August 21Ѐ“23, 2017, Proceedings / Yan, Zheng ; Molva, Refik ; Mazurczyk, Wojciech ; Kantola, Raimo
![]()
Título : 11th International Conference, NSS 2017, Helsinki, Finland, August 21Ѐ“23, 2017, Proceedings Tipo de documento: documento electrónico Autores: Yan, Zheng, ; Molva, Refik, ; Mazurczyk, Wojciech, ; Kantola, Raimo, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2017 Número de páginas: XVIII, 762 p. 214 ilustraciones ISBN/ISSN/DL: 978-3-319-64701-2 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Protección de datos Red de computadoras Criptografía Cifrado de datos (Informática) Ingeniería de software Software de la aplicacion Seguridad de datos e información Redes de comunicación informática Criptología Operaciones de TI Aplicaciones informáticas y de sistemas de información Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas de la 11.ª Conferencia Internacional sobre Seguridad de Redes y Sistemas, NSS 2017, celebrada en Helsinki, Finlandia, en agosto de 2017. Los 24 artículos completos revisados presentados en este libro fueron cuidadosamente revisados y seleccionados de 83 presentaciones iniciales. Los artículos están organizados en secciones temáticas sobre seguridad en la nube y la IoT; Seguridad de la red; Seguridad de plataforma y hardware; Cripto y otros; y Autenticación y Gestión de Claves. Este volumen también contiene 35 contribuciones de los siguientes talleres: Medidas de Seguridad de Redes Cibernéticas (SMCN-2017); Seguridad en Big Data (SECBD-2017); Seguridad 5G y Aprendizaje Automático (IW5GS-2017); del Internet de Todo (SECIOE-2017). Nota de contenido: Cloud and IoT Security -- Network Security -- Platform and Hardware Security -- Crypto and Others -- Authentication and Key Management. . En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i 11th International Conference, NSS 2017, Helsinki, Finland, August 21Ѐ“23, 2017, Proceedings [documento electrónico] / Yan, Zheng, ; Molva, Refik, ; Mazurczyk, Wojciech, ; Kantola, Raimo, . - 1 ed. . - [s.l.] : Springer, 2017 . - XVIII, 762 p. 214 ilustraciones.
ISBN : 978-3-319-64701-2
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Protección de datos Red de computadoras Criptografía Cifrado de datos (Informática) Ingeniería de software Software de la aplicacion Seguridad de datos e información Redes de comunicación informática Criptología Operaciones de TI Aplicaciones informáticas y de sistemas de información Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas de la 11.ª Conferencia Internacional sobre Seguridad de Redes y Sistemas, NSS 2017, celebrada en Helsinki, Finlandia, en agosto de 2017. Los 24 artículos completos revisados presentados en este libro fueron cuidadosamente revisados y seleccionados de 83 presentaciones iniciales. Los artículos están organizados en secciones temáticas sobre seguridad en la nube y la IoT; Seguridad de la red; Seguridad de plataforma y hardware; Cripto y otros; y Autenticación y Gestión de Claves. Este volumen también contiene 35 contribuciones de los siguientes talleres: Medidas de Seguridad de Redes Cibernéticas (SMCN-2017); Seguridad en Big Data (SECBD-2017); Seguridad 5G y Aprendizaje Automático (IW5GS-2017); del Internet de Todo (SECIOE-2017). Nota de contenido: Cloud and IoT Security -- Network Security -- Platform and Hardware Security -- Crypto and Others -- Authentication and Key Management. . En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i Algorithms and Architectures for Parallel Processing / Ibrahim, Shadi ; Choo, Kim-Kwang Raymond ; Yan, Zheng ; Pedrycz, Witold
![]()
Título : Algorithms and Architectures for Parallel Processing : 17th International Conference, ICA3PP 2017, Helsinki, Finland, August 21-23, 2017, Proceedings Tipo de documento: documento electrónico Autores: Ibrahim, Shadi, ; Choo, Kim-Kwang Raymond, ; Yan, Zheng, ; Pedrycz, Witold, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2017 Número de páginas: XXIII, 829 p. 330 ilustraciones ISBN/ISSN/DL: 978-3-319-65482-9 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Algoritmos Ingeniería de software Red de computadoras Software de la aplicacion Redes de comunicación informática Aplicaciones informáticas y de sistemas de información Índice Dewey: 518.1 Resumen: Este libro constituye las actas de la 17.ª Conferencia Internacional sobre Algoritmos y Arquitecturas para Procesamiento Paralelo, ICA3PP 2017, celebrada en Helsinki, Finlandia, en agosto de 2017. Los 25 artículos completos presentados fueron cuidadosamente revisados y seleccionados entre 117 presentaciones. Cubren temas como arquitecturas paralelas y distribuidas; sistemas de software y modelos de programación; informática distribuida y basada en red; big data y sus aplicaciones; algoritmos paralelos y distribuidos; aplicaciones de computación paralela y distribuida; confiabilidad y seguridad del servicio en sistemas distribuidos y paralelos; confiabilidad y seguridad del servicio en sistemas distribuidos y paralelos; modelado y evaluación del desempeño. Este volumen también incluye 41 artículos de cuatro talleres, a saber: el 4º Taller Internacional sobre Minería de Datos, Textos, Web y Redes Sociales (DTWSM 2017), el 5º Taller Internacional sobre Paralelismo en Bioinformática (PBio 2017), el Primer Taller Internacional sobre Computación autónoma distribuida en ciudades inteligentes (DACSC 2017) y el Segundo Taller Internacional sobre Computación Ultraescala para Investigadores Tempranos (UCER 2017). . Nota de contenido: Parallel and distributed architectures -- Software systems and programming models -- Distributed and network-based computing -- Big data and its applications -- Parallel and distributed algorithms -- Applications of parallel and distributed computing -- Service dependability and security in distributed and parallel systems -- Service dependability and security in distributed and parallel systems -- Performance modeling and evaluation. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i Algorithms and Architectures for Parallel Processing : 17th International Conference, ICA3PP 2017, Helsinki, Finland, August 21-23, 2017, Proceedings [documento electrónico] / Ibrahim, Shadi, ; Choo, Kim-Kwang Raymond, ; Yan, Zheng, ; Pedrycz, Witold, . - 1 ed. . - [s.l.] : Springer, 2017 . - XXIII, 829 p. 330 ilustraciones.
ISBN : 978-3-319-65482-9
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Algoritmos Ingeniería de software Red de computadoras Software de la aplicacion Redes de comunicación informática Aplicaciones informáticas y de sistemas de información Índice Dewey: 518.1 Resumen: Este libro constituye las actas de la 17.ª Conferencia Internacional sobre Algoritmos y Arquitecturas para Procesamiento Paralelo, ICA3PP 2017, celebrada en Helsinki, Finlandia, en agosto de 2017. Los 25 artículos completos presentados fueron cuidadosamente revisados y seleccionados entre 117 presentaciones. Cubren temas como arquitecturas paralelas y distribuidas; sistemas de software y modelos de programación; informática distribuida y basada en red; big data y sus aplicaciones; algoritmos paralelos y distribuidos; aplicaciones de computación paralela y distribuida; confiabilidad y seguridad del servicio en sistemas distribuidos y paralelos; confiabilidad y seguridad del servicio en sistemas distribuidos y paralelos; modelado y evaluación del desempeño. Este volumen también incluye 41 artículos de cuatro talleres, a saber: el 4º Taller Internacional sobre Minería de Datos, Textos, Web y Redes Sociales (DTWSM 2017), el 5º Taller Internacional sobre Paralelismo en Bioinformática (PBio 2017), el Primer Taller Internacional sobre Computación autónoma distribuida en ciudades inteligentes (DACSC 2017) y el Segundo Taller Internacional sobre Computación Ultraescala para Investigadores Tempranos (UCER 2017). . Nota de contenido: Parallel and distributed architectures -- Software systems and programming models -- Distributed and network-based computing -- Big data and its applications -- Parallel and distributed algorithms -- Applications of parallel and distributed computing -- Service dependability and security in distributed and parallel systems -- Service dependability and security in distributed and parallel systems -- Performance modeling and evaluation. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i Security, Privacy, and Anonymity in Computation, Communication, and Storage / Wang, Guojun ; Atiquzzaman, Mohammed ; Yan, Zheng ; Choo, Kim-Kwang Raymond
![]()
Título : Security, Privacy, and Anonymity in Computation, Communication, and Storage : 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedings Tipo de documento: documento electrónico Autores: Wang, Guojun, ; Atiquzzaman, Mohammed, ; Yan, Zheng, ; Choo, Kim-Kwang Raymond, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2017 Número de páginas: XVIII, 610 p. 200 ilustraciones ISBN/ISSN/DL: 978-3-319-72389-1 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Protección de datos Red de computadoras Ingeniería Informática Criptografía Cifrado de datos (Informática) Inteligencia artificial Seguridad de datos e información Redes de comunicación informática Ingeniería Informática y Redes Criptología Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas arbitradas de la 10.ª Conferencia internacional sobre seguridad, privacidad y anonimato en computación, comunicación y almacenamiento, SpaCCS 2017, celebrada en Guangzhou, China, en diciembre de 2017. Los 47 artículos presentados en este volumen fueron cuidadosamente revisados y seleccionados de 140 presentaciones. Abordan los hallazgos de la investigación, los logros, las innovaciones y las perspectivas en seguridad de la información y campos relacionados que abarcan temas como algoritmos y arquitecturas de seguridad, políticas, regulaciones y técnicas conscientes de la privacidad, computación y comunicación anónimas, que abarcan enfoques teóricos fundamentales, proyectos experimentales prácticos y sistemas de aplicación comercial para computación, comunicación y almacenamiento. Nota de contenido: Optimized Analysis Based on Improved Mutation and Crossover Operator for Differential Evolution Algorithm -- Revisiting Localization Attacks in Mobile App People-Nearby Services -- Lengthening Unidimensional Continuous-variable Quantum Key Distribution with Noiseless Linear Amplifier -- Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext -- An Attack to an Anonymous Certi cateless Group Key Agreement Scheme and its Improvement -- A Space Effcient Algorithm for LCIS Problem -- Improving the Efficiency of Dynamic Programming in Big Data Computing -- Traceable and Complete Fine-Grained Revocable Multi-Authority Attribute-Based Encryption Scheme in Social Network -- The All Seeing Eye: Web to App Intercommunication for Session Fingerprinting in Android -- An Efficient Hierarchical Identity-Based Encryption Scheme for the Key Escrow -- An Improved Pre-Copy Transmission Algorithm in Mobile Cloud Computing -- Motivation of DDOS Attack-Aware Link Assignment between Switches to SDN Controllers -- TIM: A Trust Insurance Mechanism for Network Function Virtualization Based on Trusted Computing -- Personalized Semantic Location Privacy Preservation Algorithm Based on Query Processing Cost Optimization -- Smartphone Bloatware: An Overlooked Privacy Problem -- An ECC-Based off-line Anonymous Grouping-proof Protocol -- PCSD: A Tool for Android Malware Detection -- Authorship Analysis of Social Media Contents Using Tone and Personality Features -- Privacy-Preserving Handover Authentication Protocol from Lightweight Identity-Based Signature for Wireless Networks -- Spatial Outlier Information Hiding Algorithm Based on Complex Transformation -- A Reputation Model Considering Repurchase Behavior and Mechanism Design to Promote Repurchase -- Chinese Named Entity Recognition Based on B-LSTM Neural Network with Additional Features -- Amplified Locality-Sensitive Hashing for Privacypreserving Distributed Service Recommendation -- Learn to Accelerate Identifying New TestCases in Fuzzing -- Service Selection Based on User Privacy Risk Evaluation -- An Efficient Lattice-Based Proxy Signature with Message Recovery -- FABAC: A Flexible Fuzzy Attribute-Based Access Control Mechanism -- Security Analysis and Improvement of An Anonymous Attribute-Based Proxy Re-encryption -- Relacha: Using Associative Meaning for Image Captcha Understandability -- Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces -- A Formal Android Permission Model Based on the B Method -- S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks -- MCloud: Efficient Monitoring Framework for Cloud Computing Platforms -- Secure Vibration Control of Flexible Arms based on Operators' Behaviors -- A New Color Image Encryption Scheme Based on Chaotic Hénon Map and Lü System -- A Distributed Authentication Protocol using Identity-based Encryption and Blockchain for LEO Network -- A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation -- A Unified Model for Detecting Privacy Leakage on Android -- Multi-party Security Computation with Differential Privacy Over Outsourced Data -- REW-SMT: A New Approach for Rewriting XACML Request with Dynamic Big Data Security Policies -- Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine Introspection -- Privacy Preserving Hierarchical Clustering over Multi-Party Data Distribution -- Improving MQTT by Inclusion of Usage Control -- Using JSON to Specify Privacy Preserving-enabled Attribute-based Access Control Policies -- Comprehensive Diversity in Recommender Systems -- Towards Intelligent System Wide Information Management for Air Traffic Management -- A Security Risk Management Model for Cloud Computing Systems: Infrastructure As A Service. . En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i Security, Privacy, and Anonymity in Computation, Communication, and Storage : 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedings [documento electrónico] / Wang, Guojun, ; Atiquzzaman, Mohammed, ; Yan, Zheng, ; Choo, Kim-Kwang Raymond, . - 1 ed. . - [s.l.] : Springer, 2017 . - XVIII, 610 p. 200 ilustraciones.
ISBN : 978-3-319-72389-1
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Protección de datos Red de computadoras Ingeniería Informática Criptografía Cifrado de datos (Informática) Inteligencia artificial Seguridad de datos e información Redes de comunicación informática Ingeniería Informática y Redes Criptología Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas arbitradas de la 10.ª Conferencia internacional sobre seguridad, privacidad y anonimato en computación, comunicación y almacenamiento, SpaCCS 2017, celebrada en Guangzhou, China, en diciembre de 2017. Los 47 artículos presentados en este volumen fueron cuidadosamente revisados y seleccionados de 140 presentaciones. Abordan los hallazgos de la investigación, los logros, las innovaciones y las perspectivas en seguridad de la información y campos relacionados que abarcan temas como algoritmos y arquitecturas de seguridad, políticas, regulaciones y técnicas conscientes de la privacidad, computación y comunicación anónimas, que abarcan enfoques teóricos fundamentales, proyectos experimentales prácticos y sistemas de aplicación comercial para computación, comunicación y almacenamiento. Nota de contenido: Optimized Analysis Based on Improved Mutation and Crossover Operator for Differential Evolution Algorithm -- Revisiting Localization Attacks in Mobile App People-Nearby Services -- Lengthening Unidimensional Continuous-variable Quantum Key Distribution with Noiseless Linear Amplifier -- Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext -- An Attack to an Anonymous Certi cateless Group Key Agreement Scheme and its Improvement -- A Space Effcient Algorithm for LCIS Problem -- Improving the Efficiency of Dynamic Programming in Big Data Computing -- Traceable and Complete Fine-Grained Revocable Multi-Authority Attribute-Based Encryption Scheme in Social Network -- The All Seeing Eye: Web to App Intercommunication for Session Fingerprinting in Android -- An Efficient Hierarchical Identity-Based Encryption Scheme for the Key Escrow -- An Improved Pre-Copy Transmission Algorithm in Mobile Cloud Computing -- Motivation of DDOS Attack-Aware Link Assignment between Switches to SDN Controllers -- TIM: A Trust Insurance Mechanism for Network Function Virtualization Based on Trusted Computing -- Personalized Semantic Location Privacy Preservation Algorithm Based on Query Processing Cost Optimization -- Smartphone Bloatware: An Overlooked Privacy Problem -- An ECC-Based off-line Anonymous Grouping-proof Protocol -- PCSD: A Tool for Android Malware Detection -- Authorship Analysis of Social Media Contents Using Tone and Personality Features -- Privacy-Preserving Handover Authentication Protocol from Lightweight Identity-Based Signature for Wireless Networks -- Spatial Outlier Information Hiding Algorithm Based on Complex Transformation -- A Reputation Model Considering Repurchase Behavior and Mechanism Design to Promote Repurchase -- Chinese Named Entity Recognition Based on B-LSTM Neural Network with Additional Features -- Amplified Locality-Sensitive Hashing for Privacypreserving Distributed Service Recommendation -- Learn to Accelerate Identifying New TestCases in Fuzzing -- Service Selection Based on User Privacy Risk Evaluation -- An Efficient Lattice-Based Proxy Signature with Message Recovery -- FABAC: A Flexible Fuzzy Attribute-Based Access Control Mechanism -- Security Analysis and Improvement of An Anonymous Attribute-Based Proxy Re-encryption -- Relacha: Using Associative Meaning for Image Captcha Understandability -- Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces -- A Formal Android Permission Model Based on the B Method -- S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks -- MCloud: Efficient Monitoring Framework for Cloud Computing Platforms -- Secure Vibration Control of Flexible Arms based on Operators' Behaviors -- A New Color Image Encryption Scheme Based on Chaotic Hénon Map and Lü System -- A Distributed Authentication Protocol using Identity-based Encryption and Blockchain for LEO Network -- A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation -- A Unified Model for Detecting Privacy Leakage on Android -- Multi-party Security Computation with Differential Privacy Over Outsourced Data -- REW-SMT: A New Approach for Rewriting XACML Request with Dynamic Big Data Security Policies -- Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine Introspection -- Privacy Preserving Hierarchical Clustering over Multi-Party Data Distribution -- Improving MQTT by Inclusion of Usage Control -- Using JSON to Specify Privacy Preserving-enabled Attribute-based Access Control Policies -- Comprehensive Diversity in Recommender Systems -- Towards Intelligent System Wide Information Management for Air Traffic Management -- A Security Risk Management Model for Cloud Computing Systems: Infrastructure As A Service. . En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i Security, Privacy, and Anonymity in Computation, Communication, and Storage / Wang, Guojun ; Atiquzzaman, Mohammed ; Yan, Zheng ; Choo, Kim-Kwang Raymond
![]()
Título : Security, Privacy, and Anonymity in Computation, Communication, and Storage : SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings Tipo de documento: documento electrónico Autores: Wang, Guojun, ; Atiquzzaman, Mohammed, ; Yan, Zheng, ; Choo, Kim-Kwang Raymond, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2017 Número de páginas: XVI, 855 p. 314 ilustraciones ISBN/ISSN/DL: 978-3-319-72395-2 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Palabras clave: Protección de datos Red de computadoras Criptografía Cifrado de datos (Informática) Ingeniería Informática Inteligencia artificial Seguridad de datos e información Redes de comunicación informática Criptología Ingeniería Informática y Redes Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas arbitradas de 11 simposios y talleres celebrados en la Décima Conferencia Internacional sobre Seguridad, Privacidad y Anonimato en Computación, Comunicación y Almacenamiento, SpaCCS 2017, celebrada en Guangzhou, China, en diciembre de 2017. El total de 75 artículos presentados en este volumen fue cuidadosamente revisado y seleccionado de un total de 190 presentaciones a todos los talleres: UbiSafe 2017: El 9º Simposio Internacional IEEE sobre Computación UbiSafe ISSR 2017: El 9º Taller Internacional IEEE sobre Seguridad en e-Ciencia y e-Research TrustData 2017: El 8º Taller Internacional sobre Confianza, Seguridad y Privacidad para Big Data TSP 2017: El 7º Simposio Internacional sobre Confianza, Seguridad y Privacidad para Aplicaciones Emergentes SPIoT 2017: El 6º Simposio Internacional sobre Seguridad y Privacidad en Internet de las Cosas NOPE 2017: El 5º Simposio Internacional Taller sobre optimización de redes y evaluación del rendimiento DependSys 2017: Tercer simposio internacional sobre confiabilidad en sistemas y aplicaciones de sensores, nube y big data SCS 2017: Tercer simposio internacional sobre sistemas de sensores-nube WCSSC 2017: Segundo taller internacional sobre servicios de almacenamiento en la nube and Computing MSCF 2017: El primer simposio internacional sobre seguridad multimedia y ciencia forense digital SPBD 2017: El simposio internacional de 2017 sobre Big Data y aprendizaje automático en seguridad de la información, privacidad y anonimato. Nota de contenido: The 9th IEEE International Symposium on UbiSafe Computing (UbiSafe 2017) -- MTIV: A Trustworthiness Determination Approach for Threat Intelligence -- CoDistributed Caching Based Memory Optimizing Technology for Stream Data of IoV -- Secure Transfer Protocol Between App and Device of Internet of Things -- Rogue Access Points Detection Based on Theory of SemiSupervised Learning -- Phishing Detection Method Based on Borderline-Smote Deep Belief Network -- Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field -- Security Review and Study of DoS Attack on DNS in the International Roaming EPC_LTE Network -- A SYN Flood Detection Method Based on Self – similarity in Network Traffic -- Annotating Network Service Fault based on Temporal Interval Relations -- The 9th IEEE International Workshop on Security in e-Science and e-Research (ISSR 2017) -- An Anonymous Identity-Based Authentication Scheme in Vector Network -- The 8th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2017) -- Two Improved Anonymous Authentication Methods for PCS -- Multi-Match Segments Similarity Join Algorithm Based on MapReduce -- GPU-accelerated Histogram Generation on Smart-phone and Webbrowser -- An Efficient Message Routing Algorithm Using Overhearing in Community Opportunistic Networks -- A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping -- Game Theoretical Analysis on System Adoption and Acceptance: A Review -- A Novel Bivariate Entropy-based Network Anomaly Detection System -- The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance -- Neural Network based Web Log Analysis for Web Intrusion Detection -- The 7th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2017) -- Code Abstractions for Automatic Information Flow Control in a Model-Driven Approach -- WaybackVisor: Hypervisor-based Scalable Live Forensic Architecture for Timeline Analysis -- Cloud Ownership and Reliability – Issues and Developments -- A Trust-based Service Self-Organizing Model for Cloud Market -- A Reliable Resource Scheduling for Network Function Virtualization -- On Global Resource Allocation in Clusters for Data Analytics -- An Automatic Generation Method for Condition Expressions of CPN Model Focus on Tested Behaviors -- The 6th International Symposium on Security and Privacy on Internet of Things (SPIoT 2017) -- Analysing the Resilience of the Internet of Things against Physical and Proximity Attacks -- Ensuring IoT/M2M System Security under the Limitation of Constrained Gateways -- Spatial Reconfigurable Physical Unclonable Functions for the Internet of Things -- Localizing Wireless Jamming Attacks with Minimal Network Resources -- The 5th International Workshop on Network Optimization and Performance Evaluation (NOPE 2017) -- An Architecture of Urban Regional Health Information System andIts Data Conversion Algorithm -- CCN Hotspot Cache Placement Strategy Based on Genetic Algorithm -- The Impact of Routing Protocols on the Performance of a Mobility Model in Mobile Ad Hoc Network (MANET) -- A Comparative Study of Zynq-based OpenFlow Switches in a Software/Hardware Co-design -- Design and Implementation of a Low-cost Software De ned Wireless Network Testbed for Smart Home -- Energy-efficiency Aware Cooperative Caching Strategy for Content-centric Networks -- The 3rd International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2017). -Password Recovery for ZIP Files Based on ARM-FPGA Cluster -- Comparison of Different Centrality Measures to Find Influential Nodes in Complex Networks -- An FPGA-based Algorithm to Accelerate Regular Expression Matching -- A Collaborative Filtering Recommendation Algorithm Based on Score Classification -- FluteDB: An Efficient and Dependable Time-Series Database Storage Engine -- Attacks on the Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud -- Research on Coupling Reliability Problem in Sensor- Cloud System -- An On-demand Monitoring Approach for Cloud Computing Systems -- Security on "A Lightweight Authentication Scheme with User Untraceability" -- A Security Scheme of Big Data Identity for Cloud Environment -- A Compact Construction for Non-monotonic Online/Offline CP-ABE scheme -- RPS-TSM: A Robot Perception System Based on Temporal Semantic Map -- MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data -- The Art of Using Cross-Layer Design in Cognitive Radio Networks -- A Quality Model for Evaluating Encryption-as-a-Service -- Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement -- A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration -- Security and Attack Vector Analysis of IoT Devices -- Security Solution of RFID Card through Cryptography -- Grouping Users for Quick Recommendations of Text Documents based on Deep Neural Network -- Module-level Software Streaming Loading Model Based on Hypervisor -- The 3rd International Symposium on Sensor-Cloud Systems (SCS 2017) -- On-Street Car Parking Prediction in Smart City: A Multi-Source Data Analysis in Sensor-Cloud Environment -- A Weight-bind-based Safe Top-k Query Processing Scheme in Two-tiered Sensor Networks -- A Floorplanning Algorithm for Partially Reconfigurable FPGA in Wireless Sensor Network -- CO-TDMA: a TDMA Protocol for Collecting Data and OAP at the Same Time -- Cloud-assisted Data Storage and Query Processing at Vehicular Ad-hoc Sensor Networks -- EFAV-MERD: Expected Forwarding Area Volume and Residual Distance Mathematic Expectation Routing Protocol for UASNs -- The 2nd International Workshop on Cloud Storage Service and Computing (WCSSC 2017) -- Fast Truss Decomposition in Memory -- Pyramid:Revisiting Memory Extension with Remote Accessible Non-Volatile Main Memory -- Fully Decentralized Multi-Authority ABE Scheme in Data Sharing System -- Malware Variants Detection Using Density Based Spatial Clustering with Global Opcode Matrix -- Research on Graph Processing Systems on a Single Machine -- 3D Model Reconstruction with Sequence Image of Aircraft -- Construction Research on Information Platform for Small and Medium-sized Enterprises Based on Cloud Storage Technology -- XoT: A Flexible Block I/O Data Transfer Protocol for Xen -- The First International Symposium on Multimedia Security and Digital Forensics (MSDF 2017) -- Detecting Spliced Face using Texture Analysis -- Fine-grained, Multi-key Search Control in Multi-user Searchable Encryption -- Overview of Performance Evaluation of Keyword Search Utilities in Forensic/E-Discovery Software -- The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity (SPBD 2017) -- Distribution Network Topology Reconstruction Method Based on Lasso and Its Supplementary Criterions. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i Security, Privacy, and Anonymity in Computation, Communication, and Storage : SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings [documento electrónico] / Wang, Guojun, ; Atiquzzaman, Mohammed, ; Yan, Zheng, ; Choo, Kim-Kwang Raymond, . - 1 ed. . - [s.l.] : Springer, 2017 . - XVI, 855 p. 314 ilustraciones.
ISBN : 978-3-319-72395-2
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Palabras clave: Protección de datos Red de computadoras Criptografía Cifrado de datos (Informática) Ingeniería Informática Inteligencia artificial Seguridad de datos e información Redes de comunicación informática Criptología Ingeniería Informática y Redes Índice Dewey: 005.8 Ciencia de los computadores (Programación, programas de sistemas) Resumen: Este libro constituye las actas arbitradas de 11 simposios y talleres celebrados en la Décima Conferencia Internacional sobre Seguridad, Privacidad y Anonimato en Computación, Comunicación y Almacenamiento, SpaCCS 2017, celebrada en Guangzhou, China, en diciembre de 2017. El total de 75 artículos presentados en este volumen fue cuidadosamente revisado y seleccionado de un total de 190 presentaciones a todos los talleres: UbiSafe 2017: El 9º Simposio Internacional IEEE sobre Computación UbiSafe ISSR 2017: El 9º Taller Internacional IEEE sobre Seguridad en e-Ciencia y e-Research TrustData 2017: El 8º Taller Internacional sobre Confianza, Seguridad y Privacidad para Big Data TSP 2017: El 7º Simposio Internacional sobre Confianza, Seguridad y Privacidad para Aplicaciones Emergentes SPIoT 2017: El 6º Simposio Internacional sobre Seguridad y Privacidad en Internet de las Cosas NOPE 2017: El 5º Simposio Internacional Taller sobre optimización de redes y evaluación del rendimiento DependSys 2017: Tercer simposio internacional sobre confiabilidad en sistemas y aplicaciones de sensores, nube y big data SCS 2017: Tercer simposio internacional sobre sistemas de sensores-nube WCSSC 2017: Segundo taller internacional sobre servicios de almacenamiento en la nube and Computing MSCF 2017: El primer simposio internacional sobre seguridad multimedia y ciencia forense digital SPBD 2017: El simposio internacional de 2017 sobre Big Data y aprendizaje automático en seguridad de la información, privacidad y anonimato. Nota de contenido: The 9th IEEE International Symposium on UbiSafe Computing (UbiSafe 2017) -- MTIV: A Trustworthiness Determination Approach for Threat Intelligence -- CoDistributed Caching Based Memory Optimizing Technology for Stream Data of IoV -- Secure Transfer Protocol Between App and Device of Internet of Things -- Rogue Access Points Detection Based on Theory of SemiSupervised Learning -- Phishing Detection Method Based on Borderline-Smote Deep Belief Network -- Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field -- Security Review and Study of DoS Attack on DNS in the International Roaming EPC_LTE Network -- A SYN Flood Detection Method Based on Self – similarity in Network Traffic -- Annotating Network Service Fault based on Temporal Interval Relations -- The 9th IEEE International Workshop on Security in e-Science and e-Research (ISSR 2017) -- An Anonymous Identity-Based Authentication Scheme in Vector Network -- The 8th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2017) -- Two Improved Anonymous Authentication Methods for PCS -- Multi-Match Segments Similarity Join Algorithm Based on MapReduce -- GPU-accelerated Histogram Generation on Smart-phone and Webbrowser -- An Efficient Message Routing Algorithm Using Overhearing in Community Opportunistic Networks -- A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping -- Game Theoretical Analysis on System Adoption and Acceptance: A Review -- A Novel Bivariate Entropy-based Network Anomaly Detection System -- The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance -- Neural Network based Web Log Analysis for Web Intrusion Detection -- The 7th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2017) -- Code Abstractions for Automatic Information Flow Control in a Model-Driven Approach -- WaybackVisor: Hypervisor-based Scalable Live Forensic Architecture for Timeline Analysis -- Cloud Ownership and Reliability – Issues and Developments -- A Trust-based Service Self-Organizing Model for Cloud Market -- A Reliable Resource Scheduling for Network Function Virtualization -- On Global Resource Allocation in Clusters for Data Analytics -- An Automatic Generation Method for Condition Expressions of CPN Model Focus on Tested Behaviors -- The 6th International Symposium on Security and Privacy on Internet of Things (SPIoT 2017) -- Analysing the Resilience of the Internet of Things against Physical and Proximity Attacks -- Ensuring IoT/M2M System Security under the Limitation of Constrained Gateways -- Spatial Reconfigurable Physical Unclonable Functions for the Internet of Things -- Localizing Wireless Jamming Attacks with Minimal Network Resources -- The 5th International Workshop on Network Optimization and Performance Evaluation (NOPE 2017) -- An Architecture of Urban Regional Health Information System andIts Data Conversion Algorithm -- CCN Hotspot Cache Placement Strategy Based on Genetic Algorithm -- The Impact of Routing Protocols on the Performance of a Mobility Model in Mobile Ad Hoc Network (MANET) -- A Comparative Study of Zynq-based OpenFlow Switches in a Software/Hardware Co-design -- Design and Implementation of a Low-cost Software De ned Wireless Network Testbed for Smart Home -- Energy-efficiency Aware Cooperative Caching Strategy for Content-centric Networks -- The 3rd International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2017). -Password Recovery for ZIP Files Based on ARM-FPGA Cluster -- Comparison of Different Centrality Measures to Find Influential Nodes in Complex Networks -- An FPGA-based Algorithm to Accelerate Regular Expression Matching -- A Collaborative Filtering Recommendation Algorithm Based on Score Classification -- FluteDB: An Efficient and Dependable Time-Series Database Storage Engine -- Attacks on the Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud -- Research on Coupling Reliability Problem in Sensor- Cloud System -- An On-demand Monitoring Approach for Cloud Computing Systems -- Security on "A Lightweight Authentication Scheme with User Untraceability" -- A Security Scheme of Big Data Identity for Cloud Environment -- A Compact Construction for Non-monotonic Online/Offline CP-ABE scheme -- RPS-TSM: A Robot Perception System Based on Temporal Semantic Map -- MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data -- The Art of Using Cross-Layer Design in Cognitive Radio Networks -- A Quality Model for Evaluating Encryption-as-a-Service -- Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement -- A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration -- Security and Attack Vector Analysis of IoT Devices -- Security Solution of RFID Card through Cryptography -- Grouping Users for Quick Recommendations of Text Documents based on Deep Neural Network -- Module-level Software Streaming Loading Model Based on Hypervisor -- The 3rd International Symposium on Sensor-Cloud Systems (SCS 2017) -- On-Street Car Parking Prediction in Smart City: A Multi-Source Data Analysis in Sensor-Cloud Environment -- A Weight-bind-based Safe Top-k Query Processing Scheme in Two-tiered Sensor Networks -- A Floorplanning Algorithm for Partially Reconfigurable FPGA in Wireless Sensor Network -- CO-TDMA: a TDMA Protocol for Collecting Data and OAP at the Same Time -- Cloud-assisted Data Storage and Query Processing at Vehicular Ad-hoc Sensor Networks -- EFAV-MERD: Expected Forwarding Area Volume and Residual Distance Mathematic Expectation Routing Protocol for UASNs -- The 2nd International Workshop on Cloud Storage Service and Computing (WCSSC 2017) -- Fast Truss Decomposition in Memory -- Pyramid:Revisiting Memory Extension with Remote Accessible Non-Volatile Main Memory -- Fully Decentralized Multi-Authority ABE Scheme in Data Sharing System -- Malware Variants Detection Using Density Based Spatial Clustering with Global Opcode Matrix -- Research on Graph Processing Systems on a Single Machine -- 3D Model Reconstruction with Sequence Image of Aircraft -- Construction Research on Information Platform for Small and Medium-sized Enterprises Based on Cloud Storage Technology -- XoT: A Flexible Block I/O Data Transfer Protocol for Xen -- The First International Symposium on Multimedia Security and Digital Forensics (MSDF 2017) -- Detecting Spliced Face using Texture Analysis -- Fine-grained, Multi-key Search Control in Multi-user Searchable Encryption -- Overview of Performance Evaluation of Keyword Search Utilities in Forensic/E-Discovery Software -- The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity (SPBD 2017) -- Distribution Network Topology Reconstruction Method Based on Lasso and Its Supplementary Criterions. En línea: https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Link: https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i

