| Título : |
Network and System Security : 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Yang, Min, ; Chen, Chao, ; Liu, Yang, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2021 |
| Número de páginas: |
XIII, 384 p. 122 ilustraciones, 78 ilustraciones en color. |
| ISBN/ISSN/DL: |
978-3-030-92708-0 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Criptografía Cifrado de datos (Informática) Criptología |
| Índice Dewey: |
5.824 |
| Resumen: |
Este libro constituye las actas arbitradas de la 15.ª Conferencia Internacional sobre Seguridad de Redes y Sistemas, NSS 2021, celebrada en Tianjin, China, el 23 de octubre de 2021. Los 16 artículos completos y 8 artículos breves presentados en este libro fueron cuidadosamente revisados y seleccionados entre 62 presentaciones. Se centran en aspectos teóricos y prácticos de la seguridad de redes y sistemas, como autenticación, control de acceso, disponibilidad, integridad, privacidad, confidencialidad, confiabilidad y sostenibilidad de redes y sistemas informáticos. |
| Nota de contenido: |
Full papers -- RLTree: Website Fingerprinting through ResourceLoading Tree -- Re-check Your Certificates! Experiences and Lessons Learnt from Real-world HTTPS Certificate Deployments -- ZERMIA - A Fault Injector framework for testing Byzantine Fault Tolerant protocols -- Revocable Data Sharing Methodology Based on SGX and Blockchain -- On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices -- Preventing Fake News Propagation in Social Networks using a context Trust-based security model -- A Lightweight Android Malware Detection Framework based on Knowledge Distillation -- Federated learning-based intrusion detection in the context of IIoT networks: Poisoning Attack and defense -- A Simplified and Effective Solution for Hybrid SDN Network Deployment -- Group Key Exchange Compilers from Generic Key Exchanges -- An architecture for processing a dynamic heterogeneous information network of security intelligence -- The Complexity of Testing Cryptographic Devices on Input Faults -- A Malware Family Classification Method Based on the Point Cloud Model DGCNN -- Collection of the main Anti-Virus detection and bypass techniques -- Profiled Attacks against the Elliptic Curve Scalar Point Multiplication using Neural Networks -- Deep Cross-modal Supervised Hashing based on Joint Semantic Matrix -- Short papers -- Accurate Polar Harmonic Transform-based Watermarking Using Blind Statistical Detector -- Cloud Key Management Based on Verifiable Secret Sharing -- A Scheme for Sensor Data Reconstruction in Smart Home -- Privacy-preserving and Auditable Federated Deep Reinforcement Learning for Robotic Manipulation -- HALNet: A Hybrid Deep Learning Model for Encrypted C&C Malware Traffic Detection -- Tracing Software Exploitation -- A Secure and Privacy Preserving Federated Learning Approach for IoT Intrusion Detection System -- Cryptanalysis of A Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018. |
| En línea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
Network and System Security : 15th International Conference, NSS 2021, Tianjin, China, October 23, 2021, Proceedings [documento electrónico] / Yang, Min, ; Chen, Chao, ; Liu, Yang, . - 1 ed. . - [s.l.] : Springer, 2021 . - XIII, 384 p. 122 ilustraciones, 78 ilustraciones en color. ISBN : 978-3-030-92708-0 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Criptografía Cifrado de datos (Informática) Criptología |
| Índice Dewey: |
5.824 |
| Resumen: |
Este libro constituye las actas arbitradas de la 15.ª Conferencia Internacional sobre Seguridad de Redes y Sistemas, NSS 2021, celebrada en Tianjin, China, el 23 de octubre de 2021. Los 16 artículos completos y 8 artículos breves presentados en este libro fueron cuidadosamente revisados y seleccionados entre 62 presentaciones. Se centran en aspectos teóricos y prácticos de la seguridad de redes y sistemas, como autenticación, control de acceso, disponibilidad, integridad, privacidad, confidencialidad, confiabilidad y sostenibilidad de redes y sistemas informáticos. |
| Nota de contenido: |
Full papers -- RLTree: Website Fingerprinting through ResourceLoading Tree -- Re-check Your Certificates! Experiences and Lessons Learnt from Real-world HTTPS Certificate Deployments -- ZERMIA - A Fault Injector framework for testing Byzantine Fault Tolerant protocols -- Revocable Data Sharing Methodology Based on SGX and Blockchain -- On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices -- Preventing Fake News Propagation in Social Networks using a context Trust-based security model -- A Lightweight Android Malware Detection Framework based on Knowledge Distillation -- Federated learning-based intrusion detection in the context of IIoT networks: Poisoning Attack and defense -- A Simplified and Effective Solution for Hybrid SDN Network Deployment -- Group Key Exchange Compilers from Generic Key Exchanges -- An architecture for processing a dynamic heterogeneous information network of security intelligence -- The Complexity of Testing Cryptographic Devices on Input Faults -- A Malware Family Classification Method Based on the Point Cloud Model DGCNN -- Collection of the main Anti-Virus detection and bypass techniques -- Profiled Attacks against the Elliptic Curve Scalar Point Multiplication using Neural Networks -- Deep Cross-modal Supervised Hashing based on Joint Semantic Matrix -- Short papers -- Accurate Polar Harmonic Transform-based Watermarking Using Blind Statistical Detector -- Cloud Key Management Based on Verifiable Secret Sharing -- A Scheme for Sensor Data Reconstruction in Smart Home -- Privacy-preserving and Auditable Federated Deep Reinforcement Learning for Robotic Manipulation -- HALNet: A Hybrid Deep Learning Model for Encrypted C&C Malware Traffic Detection -- Tracing Software Exploitation -- A Secure and Privacy Preserving Federated Learning Approach for IoT Intrusion Detection System -- Cryptanalysis of A Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018. |
| En línea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |