Network and System Security: 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings: Lecture Notes in Computer Science, cartea 9955
Editat de Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yungen Limba Engleză Paperback – 21 sep 2016
The 31 full and 4 short papers presented in this volume were carefully reviewed and selected from 105 submissions. They were organized in topical sections named: authentication mechanism; cloud computing security; data mining for security application; privacy-preserving technologies; network security and forensics; searchable encryption; security policy and access control; security protocols, symmetric key cryptography; system security; Web security. The volume also contains one invited paper.
Din seria Lecture Notes in Computer Science
- 20%
Preț: 400.77 lei - 20%
Preț: 754.11 lei - 20%
Preț: 324.19 lei - 20%
Preț: 373.80 lei - 20%
Preț: 342.61 lei - 20%
Preț: 403.00 lei - 20%
Preț: 573.45 lei -
Preț: 395.25 lei - 20%
Preț: 487.46 lei - 20%
Preț: 355.27 lei - 20%
Preț: 731.97 lei - 20%
Preț: 293.24 lei - 20%
Preț: 669.21 lei - 20%
Preț: 984.64 lei - 20%
Preț: 620.33 lei - 20%
Preț: 336.86 lei - 20%
Preț: 330.54 lei - 20%
Preț: 313.87 lei - 20%
Preț: 679.09 lei - 20%
Preț: 373.16 lei - 20%
Preț: 782.57 lei - 20%
Preț: 434.17 lei - 20%
Preț: 489.11 lei - 20%
Preț: 904.16 lei - 20%
Preț: 375.72 lei - 20%
Preț: 400.17 lei - 20%
Preț: 432.78 lei - 20%
Preț: 631.96 lei - 20%
Preț: 432.11 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 556.96 lei - 20%
Preț: 488.90 lei - 20%
Preț: 560.93 lei - 20%
Preț: 327.36 lei - 20%
Preț: 340.04 lei - 20%
Preț: 327.36 lei - 20%
Preț: 328.94 lei - 20%
Preț: 629.71 lei - 20%
Preț: 568.70 lei - 20%
Preț: 447.31 lei - 20%
Preț: 733.68 lei - 20%
Preț: 315.26 lei - 20%
Preț: 315.62 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 850.42 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 519.32 lei
Preț: 332.10 lei
Preț vechi: 415.13 lei
-20%
Puncte Express: 498
Preț estimativ în valută:
58.76€ • 68.31$ • 50.93£
58.76€ • 68.31$ • 50.93£
Carte tipărită la comandă
Livrare economică 04-18 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319462974
ISBN-10: 3319462970
Pagini: 516
Ilustrații: XIV, 540 p. 128 illus.
Dimensiuni: 155 x 235 x 29 mm
Greutate: 0.77 kg
Ediția:1st ed. 2016
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3319462970
Pagini: 516
Ilustrații: XIV, 540 p. 128 illus.
Dimensiuni: 155 x 235 x 29 mm
Greutate: 0.77 kg
Ediția:1st ed. 2016
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Cham, Switzerland
Cuprins
Invited paper.- While Mobile Encounters with Clouds.- Authentication Mechanism.- Multi-Device Anonymous Authentication.- A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism.- Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications.- Cloud Computing Security.- Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing.- An Energy-Efficient Task Scheduling Heuristic Algorithm without Virtual Machine Migration in Real-time Cloud Environments.- An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from the OSN in Mobile Cloud Platforms.- Data Mining for Security Application.- Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security.- Realtime DDoS detection in SIP Ecosystems: Machine Learning tools of the trade.- Digital Signature.- Two-in-One Oblivious Signatures Secure in the Random Oracle Model.- A New Transitive Signature Scheme.- Privacy-preserving Technologies.- Privacy-Preserving Profile Matching Protocol Considering Conditions.- Privacy Preserving Credit Systems.- Evading System-Calls Based Intrusion Detection Systems.- Network Security and Forensic.- HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks.- A Network Timestamp Verification Mechanism for Forensic Analysis.- Searchable Encryption.- An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords.- Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards.- A System of Shareable Keyword Search on Encrypted Data.- Security Policy and Access Control.- An Attribute Based Protection Model for JSON Documents.- The GURA-G Administrative Model for User and Group Attribute Assignment.-On the relationship between finite domain ABAM and PreUCONA.- Security Protocols.- MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication.- Expressive Rating Scheme by Signatures with Predications on Ratees.- Symmetric Key Cryptography.- A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers.- Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR.- System Security.- DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern.- PMFA: Toward Passive Message Fingerprint Attacks on Challenge-based Collaborative Intrusion Detection Networks.- Iris Cancellable Template Generation based on Indexing-First-One Hashing.- Web Security.- Detecting Malicious URLs Using Lexical Analysis.- Gatekeeping Behavior Analysis for Information Credibility Assessmenton Weibo.- Data Mining for Security Application (Short Paper).- Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining.- Provable Seucirty (Short Paper).- Improved Security Proofs for Modular Exponentiation Bits.- Security Protocol (Short Paper).- Secure Outsourced Bilinear Pairings Computation for Mobile Devices.- The Design and Implementation of Multi-Dimensional Bloom Filter Storage Matrix.
Caracteristici
Includes supplementary material: sn.pub/extras