Atjaunināt sīkdatņu piekrišanu

Network and System Security: 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings 2018 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 492 pages, height x width: 235x155 mm, weight: 765 g, 117 Illustrations, color; 50 Illustrations, black and white; XII, 492 p. 167 illus., 117 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 11058
  • Izdošanas datums: 19-Dec-2018
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030027430
  • ISBN-13: 9783030027438
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 78,14 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 91,94 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 492 pages, height x width: 235x155 mm, weight: 765 g, 117 Illustrations, color; 50 Illustrations, black and white; XII, 492 p. 167 illus., 117 illus. in color., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 11058
  • Izdošanas datums: 19-Dec-2018
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030027430
  • ISBN-13: 9783030027438
Citas grāmatas par šo tēmu:

This book constitutes the proceedings of the 12th International Conference on Network and System Security, NSS 2018, held in Hong Kong, China, in August 2018. 
The 26 revised full papers and 9 short papers presented in this book were carefully reviewed and selected from 88 initial submissions. The papers cover a wide range of topics in the field, including blockchain, mobile security, applied cryptography, authentication, biometrics, IoT, privacy, and education.
Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain
1(15)
Fengjun Chen
Zhiqiang Liu
Yu Long
Zhen Liu
Ning Ding
Analysis on the Block Reward of Fork After Withholding (FAW)
16(16)
Junming Ke
Han Jiang
Xiangfu Song
Shengnan Zhao
Hao Wang
Qiuliang Xu
Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs
32(14)
Peter Ince
Joseph K. Liu
Peng Zhang
Burn After Reading: Expunging Execution Footprints of Android Apps
46(18)
Junliang Shu
Juanru Li
Yuanyuan Zhang
Dawu Gu
A Comprehensive Study of Permission Usage on Android
64(16)
Yemian Lu
Qi Li
Purui Su
Juan Pan
Jia Yan
Pengyi Zhan
Wei Guo
Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices
80(15)
Dennis Y. W. Liu
Chi Tsiu Tong
Winnie W. M. Lam
Anonymous Attribute-Based Conditional Proxy Re-encryption
95(16)
Xianping Mao
Xuefeng Li
Xiaochuan Wu
Chuansheng Wang
Junzuo Lai
A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity
111(14)
Xiaoyan Yang
Han Jiang
Mengbo Hou
Zhihua Zheng
Qiuliang Xu
Kim-Kwang Raymond Choo
Multi-user Forward Secure Dynamic Searchable Symmetric Encryption
125(16)
Qiao Wang
Yu Guo
Hejiao Huang
Xiaohua Jia
Towards Security Authentication for IoT Devices with Lattice-Based ZK
141(10)
Jie Cai
Han Jiang
Qiuliang Xu
Guangshi Lv
Minghao Zhao
Hao Wang
Secure Semantic Search Based on Two-Level Index Over Encrypted Cloud
151(9)
Lili Xia
Zhangjie Fu
Fast QuadTree-Based Pose Estimation for Security Applications Using Face Biometrics
160(14)
Paola Barra
Carmen Bisogni
Michele Nappi
Stefano Ricciardi
Walking on the Cloud: Gait Recognition, a Wearable Solution
174(13)
Aniello Castiglione
Kim-Kwang Raymond Choo
Maria De Marsico
Alessio Mecca
EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control
187(15)
Nesrine Kaaniche
Sana Belguith
Giovanni Russello
SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control
202(10)
Ahmed Raad Al-Sudani
Wanlei Zhou
Sheng Wen
Ahmed Al-Mansoori
Continuous Authentication on Smartphone by Means of Periocular and Virtual Keystroke
212(9)
Silvio Barra
Mirko Marras
Gianni Fenu
Real-Time IoT Device Activity Detection in Edge Networks
221(16)
Ibhad Hafeez
Aaron Yi Ding
Markku Antikainen
Sasu Tarkoma
Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes Through WiFi
237(14)
Chen Yunfang
Zhu Yihong
Zhou Hao
Chen Wei
Zhang Wei
Analyzing the Communication Security Between Smartphones and IoT Based on CORAS
251(15)
Motalib Hossain Bhuyan
Nur A. Azad
Weizhi Meng
Christian D. Jensen
Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture
266(11)
Yu Li
Ivan Frasure
Ademola Ayodeji Ikusan
Junjie Zhang
Rui Dai
LA3: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-Constrained Devices
277(11)
Wensheng Zhang
Chuang Wang
An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs
288(16)
Jinhui Liu
Yong Yu
Yanqi Zhao
Jianwei Jia
Shijia Wang
PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search
304(15)
Francisco-Javier Rodrigo-Gines
Javier Parra-Arnau
Weizhi Meng
Yu Wang
Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks
319(18)
Yankang Zhao
Xiaobo Ma
Jianfeng Li
Shui Yu
Wei Li
User Relationship Classification of Facebook Messenger Mobile Data using WEKA
337(12)
Amber Umair
Priyadarsi Nanda
Xiangjian He
Kim-Kwang Raymond Choo
Using Software Visualization for Supporting the Teaching of MapReduce
349(12)
Umberto Ferraro Petrillo
DBAF: Dynamic Binary Analysis Framework and Its Applications
361(15)
Ting Chen
Youzheng Feng
Xingwei Lin
Zihao Li
Xiaosong Zhang
Context-Aware Failure-Oblivious Computing as a Means of Preventing Buffer Overflows
376(15)
Manuel Rigger
Daniel Pekarek
Hanspeter Mossenbock
ATPG Binning and SAT-Based Approach to Hardware Trojan Detection for Safety-Critical Systems
391(20)
Animesh BasakChowdhury
Ansuman Banerjee
Bhargab B. Bhattacharya
Android Mai ware Detection Methods Based on the Combination of Clustering and Classification
411(12)
Zhi Xiong
Ting Guo
Qinkun Zhang
Yu Cheng
Kai Xu
An OpenvSwitch Extension for SDN Traceback
423(13)
Danni Ren
Wenti Jiang
Huakang Li
Guozi Sun
Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding Attacks
436(16)
Jiahao Peng
Xiaobo Ma
Jianfeng Li
Lei Xue
Wenjun Hu
Creating and Managing Realism in the Next-Generation Cyber Range
452(11)
Dragos-George Ionica
Florin Pop
Aniello Castiglione
Understanding the Behaviors of BGP-based DDoS Protection Services
463(11)
Tony Miu Tung
Chenxu Wang
Jinhe Wang
Position Paper on Blockchain Technology: Smart Contract and Applications
474(10)
Weizhi Meng
Jianfeng Wang
Xianmin Wang
Joseph Liu
Zuoxia Yu
Jin Li
Yongjun Zhao
Sherman S. M. Chow
Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT
484(7)
Junbin Fang
Yun Ju Huang
Frankie Li
Jing Li
Xuan Wang
Yang Xiang
Author Index 491