Security and Privacy in New Computing Environments: 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, cartea 423
Editat de Wenbo Shi, Xiaofeng Chen, Kim-Kwang Raymond Chooen Limba Engleză Paperback – 13 mar 2022
Din seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
- 20% Preț: 327.12 lei
- Preț: 401.24 lei
- 20% Preț: 329.58 lei
- 20% Preț: 327.12 lei
- 20% Preț: 329.58 lei
- 20% Preț: 339.66 lei
- 20% Preț: 333.72 lei
- 20% Preț: 325.80 lei
- 20% Preț: 329.58 lei
- 18% Preț: 969.44 lei
- 20% Preț: 596.46 lei
- 20% Preț: 673.17 lei
- 20% Preț: 327.95 lei
- 20% Preț: 451.70 lei
- 20% Preț: 660.81 lei
- 20% Preț: 332.06 lei
- 20% Preț: 348.57 lei
- 20% Preț: 342.65 lei
- 20% Preț: 668.22 lei
- 20% Preț: 341.95 lei
- 20% Preț: 341.15 lei
- Preț: 384.70 lei
- 20% Preț: 670.70 lei
- 5% Preț: 299.06 lei
- 20% Preț: 327.29 lei
- 20% Preț: 326.46 lei
- 20% Preț: 416.63 lei
- 20% Preț: 331.74 lei
- 20% Preț: 336.54 lei
- 20% Preț: 410.85 lei
- 20% Preț: 341.30 lei
- 20% Preț: 336.21 lei
- 20% Preț: 332.71 lei
- 20% Preț: 339.47 lei
- 20% Preț: 336.54 lei
- 20% Preț: 297.00 lei
- 20% Preț: 409.87 lei
- 20% Preț: 334.71 lei
- 20% Preț: 681.61 lei
- 20% Preț: 325.95 lei
- 20% Preț: 329.58 lei
- 5% Preț: 328.95 lei
- 20% Preț: 334.86 lei
- 20% Preț: 326.64 lei
- 20% Preț: 304.10 lei
- 20% Preț: 299.95 lei
- 20% Preț: 297.81 lei
- 20% Preț: 300.32 lei
- 20% Preț: 299.95 lei
- 20% Preț: 304.26 lei
Preț: 594.31 lei
Preț vechi: 742.89 lei
-20% Nou
Puncte Express: 891
Preț estimativ în valută:
113.75€ • 118.31$ • 95.32£
113.75€ • 118.31$ • 95.32£
Carte tipărită la comandă
Livrare economică 13-27 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030967901
ISBN-10: 3030967905
Pagini: 396
Ilustrații: XIII, 396 p. 134 illus., 86 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.58 kg
Ediția:1st ed. 2022
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Locul publicării:Cham, Switzerland
ISBN-10: 3030967905
Pagini: 396
Ilustrații: XIII, 396 p. 134 illus., 86 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.58 kg
Ediția:1st ed. 2022
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Locul publicării:Cham, Switzerland
Cuprins
Blockchain-based Outsourcing Shared Car Risk Prediction Scheme Design.- Fairness Protection Method of Vickery Auction Based on Smart Contract.- An Improved Needham-Schroeder Session Key Distribution Protocol For In-Vehicle CAN Network.- Research on Two-Party Cooperative Aigis-sig Digital Signature Protocol.- An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection.- A Lightweight PSIS Scheme Based on Multi-Node Collaboration in the IoT.- SAD: Website Fingerprint Defense based on Adversarial Examples.- A privacy-aware and time-limited data access control scheme with large universe and public traceability for Cloud-based IoD.- Multi-Party High-Dimensional Related Data Publishing via Probabilistic Principal Component Analysis and Differential Privacy.- ource code vulnerability detection method with multidimensional representation.- A Security Enhanced Verification Framework Based on Device Fingerprint in Internet of Things.- RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient.- Linear Policy Recommender Scheme for Large-Scale Attribute-based Access Control.- Non-interactive Privacy-preserving Naive Bayes Classifier Using Homomorphic Encryption.- BA-Audit: blockchain-based public auditing for aggregated data sharing in edge-assisted IoT.- Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System.- Threat Detection-Oriented Network Security Situation Assessment Method.- System Business Affecting Impact Analysis Method with Crossover Probability Theory.- RAP: A Lightweight Application Layer Defense against Website Fingerprinting.- FL-iotDP: Differential Private Federated Neural Network.- Analysis of Vulnerability of IPsec Protocol Implementation Based on Differential Fuzzing.- Honeywords Generation Method Based on Deep Learning and Rule-based Password Attack.- Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning.- GLV/GLS Scalar Multiplication on Twisted Edwards Curves.- Online Privacy of Personal Information – Perceptions v Reality.- ARTPHIL: Reversible de-identification of free-text using an integrated model Bayan.- CAFM: Precise Classication for Android Family Malware.