Atjaunināt sīkdatņu piekrišanu

E-grāmata: Security, Privacy, and Anonymity in Computation, Communication, and Storage: 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings

Edited by , Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 11342
  • Izdošanas datums: 07-Dec-2018
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030053451
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 11342
  • Izdošanas datums: 07-Dec-2018
  • Izdevniecība: Springer Nature Switzerland AG
  • Valoda: eng
  • ISBN-13: 9783030053451

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 11th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage. The 45 revised full papers were carefully reviewed and selected from 120 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.
The 11th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2018)
Protecting Your Smartphone from Theft Using Accelerometer
3(12)
Huiyong Li
Jiannan Yu
Qian Cao
SOS - Securing Open Skies
15(18)
Savio Sciancalepore
Roberto Di Pietro
DNS Traffic of a Tor Exit Node - An Analysis
33(13)
Michael Sonntag
SDN-Based Secure VANETs Communication with Fog Computing
46(14)
Muhammad Arif
Guojun Wang
Tian Wang
Tao Peng
Wearable Device Data for Criminal Investigation
60(12)
Sarah Mcnary
Aaron Hunter
Authentication of Skyline Query over Road Networks
72(12)
Xiaoyu Zhu
Jie Wu
Wei Chang
Guojun Wang
Qin Liu
A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing
84(14)
Syed Qasim Afser Rizvi
Guojun Wang
Jianer Chen
Processing Analysis of Confidential Modes of Operation
98(17)
Yasir Nawaz
Lei Wang
Kamel Ammour
The 4th International Symposium on Sensor-Cloud Systems (SCS 2018)
Matching Sensor Ontologies Through Compact Evolutionary Tabu Search Algorithm
115(10)
Xingsi Xue
Shijian Liu
Event-Triggered Fault-Detection Filter Using Coordinate Transformation Approach for Time-Varying Stochastic Systems
125(11)
Yunji Li
Li Peng
Xuefang Zhu
Wen Li
Indoor Interference Classification Based on WiFi Channel State Information
136(10)
Zhuoshi Yang
Yanxiang Wang
Lejun Zhang
Yiran Shen
Secure and Privacy Preserving RFID Based Access Control to Smart Buildings
146(10)
Ahmed Raad Al-Sudani
Shang Gao
Sheng Wen
Muhmmad Al-Khiza'ay
Answering the Min-Cost Quality-Aware Query on Multi-sources in Sensor-Cloud Systems
156(10)
Mohan Li
Yu Jiang
Yanbin Sun
Zhihong Tian
Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud Environment
166(12)
Kai Peng
Lixin Zheng
Xiaolong Xu
Tao Lin
Victor C. M. Leung
A Four-Stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Coverage
178(14)
Jingbo Xia
Jian Shen
Yaoxiang Wu
Application of Sensor-Cloud Systems: Smart Traffic Control
192(11)
Chaogang Tang
Xianglin Wei
Jin Liu
Strategy-Proof Mechanism for Provisioning Non-obedient Resources Without Payment
203(16)
Wei Song
Min Li
Shun You
The 4th International Symposium on Dependability in Sensor, Cloud and Big Data Systems and Applications (DependSys 2018)
Risk Identification-Based Association Rule Mining for Supply Chain Big Data
219(10)
Abdullah Salamai
Morteza Saberi
Omar Hussain
Elizabeth Chang
TrCMP: An App Usage Inference Method for Mobile Service Enhancement
229(11)
Xuan Zhao
Md Zakirul Alam Bhuiyan
Lianyong Qi
Hongli Nie
Wajid Rafique
Wanchun Dou
A High-Performance Adaptive Strategy of Container Checkpoint Based on Pre-replication
240(11)
Shuo Zhang
Ningjiang Chen
Hanlin Zhang
Yijun Xue
Ruwei Huang
Cloud Enabled e-Glossary System: A Smart Campus Perspective
251(10)
Musaddiq Majid Khan Al-Nadwi
Nadia Refat
Nafees Zaman
Md Arafatur Rahman
Md Zakirul Alam Bhuiyan
Ramdan Bin Razali
A Dynamic Integrity Transitivity Model for the Cloud
261(11)
Rongyu He
Haonan Sun
Yong Zhang
Enhancing Dependability in Big Data Analytics Enterprise Pipelines
272(10)
Hira Zahid
Tariq Mahmood
Nassar Ikram
Overview of Logistics Equilibrium Distribution Networks System: An Urban Perspective
282(12)
Wang Wei
Md Arafatur Rahman
Md Jahan Ali
Md Zakirul Alam Bhuiyan
Liu Yao
Hai Tao
CRAB: Blockchain Based Criminal Record Management System
294(10)
Maisha Afrida Tasnim
Abdullah Al Omar
Mohammad Shahriar Rahman
Md. Zakirul Alam Bhuiyan
Secure Passive Keyless Entry and Start System Using Machine Learning
304(15)
Usman Ahmad
Hong Song
Awais Bilal
Mamoun Alazab
Alireza Jolfaei
The 10th International Symposium on UbiSafe Computing (UbiSafe 2018)
Towards New Privacy Regulations in Europe: Users' Privacy Perception in Recommender Systems
319(12)
Itishree Mohallick
Katrien De Moor
Ozlem Ozgobek
Jon Atle Gulla
SafeTECKS: Protect Data Safety in Things-Edge-Cloud Architecture with Knowledge Sharing
331(10)
Shangfo Huang
Weifeng Lv
Zhipu Xie
Bo Huang
Bowen Du
NTRDM: A New Bus Line Network Optimization Method Based on Taxi Passenger Flow Conversion
341(10)
Bo Huang
Guixi Xiong
Zhipu Xie
Shangfo Huang
Bowen Du
BDCP: A Framework for Big Data Copyright Protection Based on Digital Watermarking
351(10)
Jingyue Yang
Haiquan Wang
Zhaoyi Wang
Jieyi Long
Bowen Du
A Privacy-Preserving Attribute-Based Access Control Scheme
361(10)
Yang Xu
Quanrun Zeng
Guojun Wang
Cheng Zhang
Ju Ren
Yaoxue Zhang
Checking an Authentication of Person Depends on RFID with Thermal Image
371(10)
Ahmed Raad Al-Sudani
Shang Gao
Sheng Wen
Muhmmad Al-Khiza'ay
Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social Networks
381(11)
Kasra Majbouri Yazdi
Add Majbouri Yazdi
Saeid Khodayi Jingyu Hou
Wanlei Zhou
Saeed Saedy
An Efficient Provable Multi-copy Data Possession Scheme with Data Dynamics
392(15)
Zuojie Deng
Shuhong Chen
Xiaolan Tan
Dan Song
Fan Wu
The 7th International Symposium on Security and Privacy on Internet of Things (SPIoT 2018)
An Enhanced Key Management Scheme for LoRaWAN
407(10)
Jialuo Han
Jidong Wang
Identifying Devices of the Internet of Things Using Machine Learning on Clock Characteristics
417(11)
Pascal Oser
Frank Kargl
Stefan Luders
A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical Systems
428(15)
Shafiq Rehman
Volker Gruhn
Saad Shafiq
Hum Inayat
Interacting with the Internet of Things Using Smart Contracts and Blockchain Technologies
443(14)
Nikos Fotiou
Vasilios A. Siris
George C. Polyzos
The 9th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2018)
Research on Multi-focus Image Fusion Algorithm Based on Quadtree
457(8)
Senlin Wang
Junhai Zhou
Qin Liu
Zheng Qin
Panlin Hou
Uncertainty Evaluation for Big Data of Mass Standards in a Key Comparison
465(7)
Xiaoping Ren
Fang Nan
Jian Wang
Research on Wireless Spectrum Sensing Technology Based on Machine Learning
472(13)
Heng Xiao
Xianchun Zhou
Yue Tian
The 10th International Workshop on Security in e-Science and e-Research (ISSR 2018)
A Novel Method for Bearing Safety Detection in Urban Rail Transit Based on Deep Learning
485(12)
Jie Tao
Shaobo Zhang
Dalian Yang
Malicious Domain Name Recognition Based on Deep Neural Networks
497(14)
Xiaodan Yan
Baojiang Cui
Jianbin Li
The 8th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2018)
Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi Signals
511(11)
Md Zakirul Alam Bhuiyan
Md. Monirul Islam
Guojun Wang
Tian Wang
E2STA: An Energy-Efficient Spatio-Temporal Query Algorithm for Wireless Sensor Networks
522(11)
Liang Liu
Zhe Xu
Yi-Ting Wang
Xiao-Lin Qin
Author Index 533