Security and Privacy in Social Networks and Big Data: 8th International Symposium, SocialSec 2022, Xi'an, China, October 16–18, 2022, Proceedings: Communications in Computer and Information Science, cartea 1663
Editat de Xiaofeng Chen, Xinyi Huang, Mirosław Kutyłowskien Limba Engleză Paperback – 8 oct 2022
The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of advancement of the field’s foundations. They were organized in topical sections as follows: Cryptography and its applications; Network security and privacy protection; Data detection; Blockchain and its applications.
Din seria Communications in Computer and Information Science
- 20% Preț: 318.93 lei
- 20% Preț: 655.52 lei
- 20% Preț: 318.12 lei
- 20% Preț: 331.04 lei
- 20% Preț: 642.92 lei
- 20% Preț: 646.61 lei
- 20% Preț: 327.16 lei
- 20% Preț: 330.73 lei
- 20% Preț: 643.08 lei
- 20% Preț: 643.42 lei
- 20% Preț: 645.97 lei
- Preț: 384.70 lei
- 20% Preț: 322.96 lei
- Preț: 378.26 lei
- 20% Preț: 329.26 lei
- 20% Preț: 327.80 lei
- 20% Preț: 325.06 lei
- 20% Preț: 642.59 lei
- 20% Preț: 331.68 lei
- 20% Preț: 327.16 lei
- 20% Preț: 327.80 lei
- 20% Preț: 331.86 lei
- 20% Preț: 653.10 lei
- 20% Preț: 307.18 lei
- 20% Preț: 329.26 lei
- 20% Preț: 331.86 lei
- 20% Preț: 323.59 lei
- 20% Preț: 647.43 lei
- 15% Preț: 635.31 lei
- 20% Preț: 640.35 lei
- 20% Preț: 325.38 lei
- 20% Preț: 331.04 lei
- 20% Preț: 1033.89 lei
- 20% Preț: 819.57 lei
- 20% Preț: 643.42 lei
- 20% Preț: 1206.03 lei
- 20% Preț: 324.60 lei
- 20% Preț: 329.26 lei
- 20% Preț: 316.51 lei
- 20% Preț: 741.18 lei
- 20% Preț: 113.93 lei
- 20% Preț: 329.44 lei
- Preț: 379.96 lei
- 20% Preț: 470.55 lei
- 20% Preț: 735.66 lei
- 20% Preț: 330.23 lei
- 20% Preț: 321.35 lei
- 20% Preț: 401.75 lei
- 20% Preț: 328.63 lei
- 20% Preț: 523.80 lei
Preț: 329.91 lei
Preț vechi: 412.39 lei
-20% Nou
Puncte Express: 495
Preț estimativ în valută:
63.13€ • 66.42$ • 52.27£
63.13€ • 66.42$ • 52.27£
Carte tipărită la comandă
Livrare economică 14-28 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9789811972416
ISBN-10: 9811972419
Pagini: 366
Ilustrații: XIII, 366 p. 130 illus., 96 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.54 kg
Ediția:1st ed. 2022
Editura: Springer Nature Singapore
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Singapore, Singapore
ISBN-10: 9811972419
Pagini: 366
Ilustrații: XIII, 366 p. 130 illus., 96 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.54 kg
Ediția:1st ed. 2022
Editura: Springer Nature Singapore
Colecția Springer
Seria Communications in Computer and Information Science
Locul publicării:Singapore, Singapore
Cuprins
Cryptography and its applications.- Improved (t,n)-Threshold Proxy Signature Scheme.- Algorithm Substitution Attacks on Identity-Based Encryption.- Authenticated Continuous Top-k Spatial Keyword Search on Dynamic Objects.- Efficient Attribute-based Proxy Re-encryption for Secure Deduplication.- A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryption.- D2D Authentication Scheme for IoT-enabled Smart Home.- Inner Product Encryption from Middle-Product Learning with Errors.- Network security and privacy protection.- Publicly Verifiable Private Set Intersection from Homomorphic Encryption.- Secure Asynchronous Federated Learning for Edge Computing Devices.- FedBC: An Efficient and Privacy-preserving Federated Consensus Scheme.- A Secure and Privacy-preserving Authentication Scheme in IoMT.- Secure and Efficient k-Nearest Neighbor Query with Privacy-Preserving Authentication.- A Network Security Situation Assessment Method Based on Multi-attention Mechanism and HHO-ResNeXt.- A Privacy-Preserving Federated Learning with Mutual Verification on Vector Spaces.- Data detection.- Patch-based Backdoors Detection and Mitigation with Feature Masking.- Detection and Defense Against DDoS Attack on SDN Controller Based on Feature Selection.- Commodity-Tra: A Traceable Transaction Scheme Based on FISCO BCOS.- A Defect Heterogeneous Risk Assessment Method with Misclassification Cost.- Squeeze-Loss: A Utility-Free Defense Against Membership Inference Attacks.- Blockchain and its applications.- Improved WAVE Signature and Apply to Post-Quantum Blockchain.- Secure Government Data Sharing Based on Blockchain and Attribute-Based Encryption.- Secure Data Storage Scheme of Judicial System based on Blockchain.- Judicial Evidence Storage Scheme Based on Smart Contract.