Atjaunināt sīkdatņu piekrišanu

E-grāmata: Network and System Security: 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings

Edited by , Edited by , Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 11058
  • Izdošanas datums: 18-Dec-2018
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030027445
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 88,63 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 11058
  • Izdošanas datums: 18-Dec-2018
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030027445
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.


This book constitutes the proceedings of the 12th International Conference on Network and System Security, NSS 2018, held in Hong Kong, China, in August 2018. 
The 26 revised full papers and 9 short papers presented in this book were carefully reviewed and selected from 88 initial submissions. The papers cover a wide range of topics in the field, including blockchain, mobile security, applied cryptography, authentication, biometrics, IoT, privacy, and education.
Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain
1(15)
Fengjun Chen
Zhiqiang Liu
Yu Long
Zhen Liu
Ning Ding
Analysis on the Block Reward of Fork After Withholding (FAW)
16(16)
Junming Ke
Han Jiang
Xiangfu Song
Shengnan Zhao
Hao Wang
Qiuliang Xu
Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs
32(14)
Peter Ince
Joseph K. Liu
Peng Zhang
Burn After Reading: Expunging Execution Footprints of Android Apps
46(18)
Junliang Shu
Juanru Li
Yuanyuan Zhang
Dawu Gu
A Comprehensive Study of Permission Usage on Android
64(16)
Yemian Lu
Qi Li
Purui Su
Juan Pan
Jia Yan
Pengyi Zhan
Wei Guo
Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices
80(15)
Dennis Y. W. Liu
Chi Tsiu Tong
Winnie W. M. Lam
Anonymous Attribute-Based Conditional Proxy Re-encryption
95(16)
Xianping Mao
Xuefeng Li
Xiaochuan Wu
Chuansheng Wang
Junzuo Lai
A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity
111(14)
Xiaoyan Yang
Han Jiang
Mengbo Hou
Zhihua Zheng
Qiuliang Xu
Kim-Kwang Raymond Choo
Multi-user Forward Secure Dynamic Searchable Symmetric Encryption
125(16)
Qiao Wang
Yu Guo
Hejiao Huang
Xiaohua Jia
Towards Security Authentication for IoT Devices with Lattice-Based ZK
141(10)
Jie Cai
Han Jiang
Qiuliang Xu
Guangshi Lv
Minghao Zhao
Hao Wang
Secure Semantic Search Based on Two-Level Index Over Encrypted Cloud
151(9)
Lili Xia
Zhangjie Fu
Fast QuadTree-Based Pose Estimation for Security Applications Using Face Biometrics
160(14)
Paola Barra
Carmen Bisogni
Michele Nappi
Stefano Ricciardi
Walking on the Cloud: Gait Recognition, a Wearable Solution
174(13)
Aniello Castiglione
Kim-Kwang Raymond Choo
Maria De Marsico
Alessio Mecca
EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control
187(15)
Nesrine Kaaniche
Sana Belguith
Giovanni Russello
SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control
202(10)
Ahmed Raad Al-Sudani
Wanlei Zhou
Sheng Wen
Ahmed Al-Mansoori
Continuous Authentication on Smartphone by Means of Periocular and Virtual Keystroke
212(9)
Silvio Barra
Mirko Marras
Gianni Fenu
Real-Time IoT Device Activity Detection in Edge Networks
221(16)
Ibhad Hafeez
Aaron Yi Ding
Markku Antikainen
Sasu Tarkoma
Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes Through WiFi
237(14)
Chen Yunfang
Zhu Yihong
Zhou Hao
Chen Wei
Zhang Wei
Analyzing the Communication Security Between Smartphones and IoT Based on CORAS
251(15)
Motalib Hossain Bhuyan
Nur A. Azad
Weizhi Meng
Christian D. Jensen
Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture
266(11)
Yu Li
Ivan Frasure
Ademola Ayodeji Ikusan
Junjie Zhang
Rui Dai
LA3: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-Constrained Devices
277(11)
Wensheng Zhang
Chuang Wang
An Efficient Privacy Preserving Batch Authentication Scheme with Deterable Function for VANETs
288(16)
Jinhui Liu
Yong Yu
Yanqi Zhao
Jianwei Jia
Shijia Wang
PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search
304(15)
Francisco-Javier Rodrigo-Gines
Javier Parra-Arnau
Weizhi Meng
Yu Wang
Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks
319(18)
Yankang Zhao
Xiaobo Ma
Jianfeng Li
Shui Yu
Wei Li
User Relationship Classification of Facebook Messenger Mobile Data using WEKA
337(12)
Amber Umair
Priyadarsi Nanda
Xiangjian He
Kim-Kwang Raymond Choo
Using Software Visualization for Supporting the Teaching of MapReduce
349(12)
Umberto Ferraro Petrillo
DBAF: Dynamic Binary Analysis Framework and Its Applications
361(15)
Ting Chen
Youzheng Feng
Xingwei Lin
Zihao Li
Xiaosong Zhang
Context-Aware Failure-Oblivious Computing as a Means of Preventing Buffer Overflows
376(15)
Manuel Rigger
Daniel Pekarek
Hanspeter Mossenbock
ATPG Binning and SAT-Based Approach to Hardware Trojan Detection for Safety-Critical Systems
391(20)
Animesh BasakChowdhury
Ansuman Banerjee
Bhargab B. Bhattacharya
Android Mai ware Detection Methods Based on the Combination of Clustering and Classification
411(12)
Zhi Xiong
Ting Guo
Qinkun Zhang
Yu Cheng
Kai Xu
An OpenvSwitch Extension for SDN Traceback
423(13)
Danni Ren
Wenti Jiang
Huakang Li
Guozi Sun
Shoot at a Pigeon and Kill a Crow: On Strike Precision of Link Flooding Attacks
436(16)
Jiahao Peng
Xiaobo Ma
Jianfeng Li
Lei Xue
Wenjun Hu
Creating and Managing Realism in the Next-Generation Cyber Range
452(11)
Dragos-George Ionica
Florin Pop
Aniello Castiglione
Understanding the Behaviors of BGP-based DDoS Protection Services
463(11)
Tony Miu Tung
Chenxu Wang
Jinhe Wang
Position Paper on Blockchain Technology: Smart Contract and Applications
474(10)
Weizhi Meng
Jianfeng Wang
Xianmin Wang
Joseph Liu
Zuoxia Yu
Jin Li
Yongjun Zhao
Sherman S. M. Chow
Position Paper on Recent Cybersecurity Trends: Legal Issues, AI and IoT
484(7)
Junbin Fang
Yun Ju Huang
Frankie Li
Jing Li
Xuan Wang
Yang Xiang
Author Index 491