Frontiers in Cyber Security: 6th International Conference, FCS 2023, Chengdu, China, August 21–23, 2023, Revised Selected Papers: Communications in Computer and Information Science, cartea 1992
Editat de Haomiao Yang, Rongxing Luen Limba Engleză Paperback – 4 ian 2024
The 44 full papers included in this book were carefully reviewed and selected from 89 submissions. They were organized in topical sections as follows: Blockchain and Distributed Systems; Network Security and Privacy Protection; Cryptography and Encryption Techniques; Machine Learning and Security; and Internet of Things and System Security.
Din seria Communications in Computer and Information Science
- 20% Preț: 318.93 lei
- 20% Preț: 655.52 lei
- 20% Preț: 318.12 lei
- 20% Preț: 331.04 lei
- 20% Preț: 642.92 lei
- 20% Preț: 646.61 lei
- 20% Preț: 327.16 lei
- 20% Preț: 330.73 lei
- 20% Preț: 643.08 lei
- 20% Preț: 643.42 lei
- 20% Preț: 645.97 lei
- Preț: 384.70 lei
- 20% Preț: 322.96 lei
- Preț: 378.26 lei
- 20% Preț: 329.26 lei
- 20% Preț: 327.80 lei
- 20% Preț: 325.06 lei
- 20% Preț: 642.59 lei
- 20% Preț: 331.68 lei
- 20% Preț: 327.16 lei
- 20% Preț: 327.80 lei
- 20% Preț: 331.86 lei
- 20% Preț: 653.10 lei
- 20% Preț: 307.18 lei
- 20% Preț: 329.26 lei
- 20% Preț: 331.86 lei
- 20% Preț: 323.59 lei
- 20% Preț: 647.43 lei
- 15% Preț: 635.31 lei
- 20% Preț: 640.35 lei
- 20% Preț: 325.38 lei
- 20% Preț: 331.04 lei
- 20% Preț: 1033.89 lei
- 20% Preț: 819.57 lei
- 20% Preț: 643.42 lei
- 20% Preț: 1206.03 lei
- 20% Preț: 324.60 lei
- 20% Preț: 329.26 lei
- 20% Preț: 316.51 lei
- 20% Preț: 741.18 lei
- 20% Preț: 113.93 lei
- 20% Preț: 329.44 lei
- Preț: 379.96 lei
- 20% Preț: 470.55 lei
- 20% Preț: 735.66 lei
- 20% Preț: 330.23 lei
- 20% Preț: 321.35 lei
- 20% Preț: 401.75 lei
- 20% Preț: 328.63 lei
- 20% Preț: 523.80 lei
Preț: 651.50 lei
Preț vechi: 814.38 lei
-20% Nou
Puncte Express: 977
Preț estimativ în valută:
124.67€ • 131.16$ • 103.49£
124.67€ • 131.16$ • 103.49£
Carte tipărită la comandă
Livrare economică 15-29 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9789819993307
ISBN-10: 981999330X
Ilustrații: XV, 673 p. 174 illus., 143 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.95 kg
Ediția:1st ed. 2024
Editura: Springer Nature Singapore
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Singapore, Singapore
ISBN-10: 981999330X
Ilustrații: XV, 673 p. 174 illus., 143 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.95 kg
Ediția:1st ed. 2024
Editura: Springer Nature Singapore
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Singapore, Singapore
Cuprins
Blockchain and Distributed Systems.- Secure Cross-chain Transaction for Medical Data Sharing in Blockchain-based Internet of Medical Things.- An blockchain-based proxy re-encryption scheme with cryptographic reverse firewall for IoV.- SCCT-DARS: Secure and Compliant Cryptocurrency Transactions in a Decentralized Anonymous Regulated System.- ODSC: A Unique Chameleon Hash-based Application Framework for Blockchain Smart Contracts.- Cross-chain Identity Authentication for BIoMT with Multi-chain Fusion Mode.- Blockchain-based signature scheme with cryptographic reverse firewalls for IoV.- Network Security and Privacy Protection.- A Hierarchical Asynchronous Federated Learning Privacy-Preserving Framework for IoVs.- A Secure Mutual Authentication Scheme for Wireless Communication.- A Multi-tab Webpage Fingerprinting Method Based on Multi-head Self-attention.- Improving Accuracy of Interactive Queries in Personalized Differential Privacy.- VPSearch+: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search without Client Storage Overhead.- Security-Enhanced Function Privacy Attribute-Based Encryption.- Certificateless Ring Signcryption Scheme with Conditional Privacy Protection in Smart Grid.- Byzantine-robust Privacy-preserving Federated Learning based on DT-PKC.- Updatable and Dynamic Searchable Symmetric Encryption Scheme with Forward and Backward Privacy.- Efficient and Secure Count Queries on Encrypted Genomic Data.- Automatic construction of knowledge graph for personal sensitive data.- Cryptography and Encryption Techniques.- Heterogeneous Aggregate Signature for Unmanned Aerial Vehicles.- Secure arbitrated quantum signature scheme with Bell state.- An Authorized Function Homomorphic Proxy Signature Scheme with Sampling Batch Verification.- ASEV: Anonymous and Scored-Based E-Voting Protocol on Blockchain.- A New Self-Dual-BKZ algorithm based on Lattice Sieving.- A Certificateless Designated Verifier Sanitizable Signature.- An Inner Product Function Encryption Scheme for Secure Distance Calculation.- Efficient Non-Interactive Zero-Knowledge Proof for Graph 3-Coloring Problem.- Cloud-Aided Scalable Revocable IBE with Ciphertext Update from Lattices in the Random Oracle Model.- Heterogeneous Signcryption Scheme With Equality Test for Internet of Vehicles.- An Improved Updatable Signature Scheme with Weakened Token.- A pairing-based certificateless authenticated searchable encryption with MTI guarantees.- Machine Learning and Security.- Anomaly detection method for integrated encrypted malicious traffic based on RFCNN-GRU.- TimeGAN: A Novel Solution to Imbalanced Encrypted Traffic Datasets.- Secure Steganography Scheme based on Steganography Generative Adversarial Network.- SR-GNN: Spectral Residuals with Graph Neural Networks for Anomaly Detection in ADS-B Data.- Learned Pseudo-Random Number Generator based on Generative Adversarial Networks.- An Intrusion Detection System Using Vision Transformer for Representation Learning.- PaBiL-Net: Parallel Bidirectional LSTM Network for Mobile Encrypted Traffic Classification.- A General Source Code Vulnerability Detection Method via Ensemble of Graph Neural Networks.- Federated Long-Tailed Learning by Retraining the Biased Classifier with Prototypes.- Internet of Things and System Security.- Ensuring SLA Compliance of Edge Enabled Cloud Service for IoT application: A Dynamic QoS-aware Scheme.- A Regenerating Code Based Data Restoration Scheme in Active RFID System.- Lightweight Privacy-Preserving Medical Diagnostic Scheme for Internet of Things Healthcare.- Windows Fuzzing Framework Based on Dynamic Tracing And Process Cloning.- Meta-HFMD: A Hierarchical Feature Fusion Malware Detection Framework via Multi-TaskMeta-Learning.- Privacy-Preserving Cloud-Edge Collaborative K-Means Clustering Model in IoT.