Security and Privacy in New Computing Environments: 4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, cartea 423
Editat de Wenbo Shi, Xiaofeng Chen, Kim-Kwang Raymond Chooen Limba Engleză Paperback – 13 mar 2022
Din seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
- 20%
Preț: 466.31 lei - 5%
Preț: 308.94 lei - 20%
Preț: 314.67 lei -
Preț: 385.99 lei - 20%
Preț: 498.10 lei - 20%
Preț: 270.65 lei - 20%
Preț: 270.55 lei - 20%
Preț: 270.65 lei - 20%
Preț: 317.05 lei - 20%
Preț: 270.03 lei - 20%
Preț: 270.78 lei - 20%
Preț: 314.67 lei - 20%
Preț: 317.05 lei - 20%
Preț: 326.72 lei - 20%
Preț: 321.03 lei - 20%
Preț: 313.42 lei - 20%
Preț: 458.37 lei - 20%
Preț: 317.05 lei - 20%
Preț: 494.93 lei - 20%
Preț: 494.77 lei - 20%
Preț: 458.67 lei - 20%
Preț: 388.29 lei - 20%
Preț: 494.47 lei - 18%
Preț: 931.81 lei - 20%
Preț: 528.97 lei - 20%
Preț: 494.34 lei - 20%
Preț: 573.45 lei - 20%
Preț: 647.15 lei - 20%
Preț: 458.79 lei - 20%
Preț: 315.48 lei - 20%
Preț: 459.24 lei - 20%
Preț: 635.26 lei - 5%
Preț: 553.47 lei - 20%
Preț: 481.11 lei - 20%
Preț: 319.42 lei - 20%
Preț: 956.44 lei - 20%
Preț: 335.29 lei - 20%
Preț: 329.60 lei - 20%
Preț: 642.40 lei - 20%
Preț: 328.94 lei - 20%
Preț: 328.16 lei -
Preț: 370.10 lei - 5%
Preț: 287.80 lei - 20%
Preț: 319.13 lei - 20%
Preț: 323.73 lei - 20%
Preț: 395.14 lei - 20%
Preț: 328.29 lei - 20%
Preț: 323.41 lei - 20%
Preț: 320.06 lei - 20%
Preț: 326.55 lei
Preț: 571.38 lei
Preț vechi: 714.23 lei
-20%
Puncte Express: 857
Preț estimativ în valută:
101.12€ • 118.18$ • 87.79£
101.12€ • 118.18$ • 87.79£
Carte tipărită la comandă
Livrare economică 20 februarie-06 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783030967901
ISBN-10: 3030967905
Pagini: 396
Ilustrații: XIII, 396 p. 134 illus., 86 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.58 kg
Ediția:1st ed. 2022
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Locul publicării:Cham, Switzerland
ISBN-10: 3030967905
Pagini: 396
Ilustrații: XIII, 396 p. 134 illus., 86 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.58 kg
Ediția:1st ed. 2022
Editura: Springer International Publishing
Colecția Springer
Seria Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Locul publicării:Cham, Switzerland
Cuprins
Blockchain-based Outsourcing Shared Car Risk Prediction Scheme Design.- Fairness Protection Method of Vickery Auction Based on Smart Contract.- An Improved Needham-Schroeder Session Key Distribution Protocol For In-Vehicle CAN Network.- Research on Two-Party Cooperative Aigis-sig Digital Signature Protocol.- An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection.- A Lightweight PSIS Scheme Based on Multi-Node Collaboration in the IoT.- SAD: Website Fingerprint Defense based on Adversarial Examples.- A privacy-aware and time-limited data access control scheme with large universe and public traceability for Cloud-based IoD.- Multi-Party High-Dimensional Related Data Publishing via Probabilistic Principal Component Analysis and Differential Privacy.- ource code vulnerability detection method with multidimensional representation.- A Security Enhanced Verification Framework Based on Device Fingerprint in Internet of Things.- RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient.- Linear Policy Recommender Scheme for Large-Scale Attribute-based Access Control.- Non-interactive Privacy-preserving Naive Bayes Classifier Using Homomorphic Encryption.- BA-Audit: blockchain-based public auditing for aggregated data sharing in edge-assisted IoT.- Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System.- Threat Detection-Oriented Network Security Situation Assessment Method.- System Business Affecting Impact Analysis Method with Crossover Probability Theory.- RAP: A Lightweight Application Layer Defense against Website Fingerprinting.- FL-iotDP: Differential Private Federated Neural Network.- Analysis of Vulnerability of IPsec Protocol Implementation Based on Differential Fuzzing.- Honeywords Generation Method Based on Deep Learning and Rule-based Password Attack.- Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning.- GLV/GLS Scalar Multiplication on Twisted Edwards Curves.- Online Privacy of Personal Information – Perceptions v Reality.- ARTPHIL: Reversible de-identification of free-text using an integrated model Bayan.- CAFM: Precise Classication for Android Family Malware.