Atjaunināt sīkdatņu piekrišanu

Trusted Computing and Information Security: 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 2427, 2019, Revised Selected Papers 2020 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 356 pages, height x width: 235x155 mm, weight: 563 g, 79 Illustrations, color; 87 Illustrations, black and white; XII, 356 p. 166 illus., 79 illus. in color., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 1149
  • Izdošanas datums: 20-Feb-2020
  • Izdevniecība: Springer Verlag, Singapore
  • ISBN-10: 9811534179
  • ISBN-13: 9789811534171
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 356 pages, height x width: 235x155 mm, weight: 563 g, 79 Illustrations, color; 87 Illustrations, black and white; XII, 356 p. 166 illus., 79 illus. in color., 1 Paperback / softback
  • Sērija : Communications in Computer and Information Science 1149
  • Izdošanas datums: 20-Feb-2020
  • Izdevniecība: Springer Verlag, Singapore
  • ISBN-10: 9811534179
  • ISBN-13: 9789811534171
This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2019, held in Shanghai, China, in October 2019.

The 22 revised full papers presented were carefully reviewed and selected from 247 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, network security, information hiding. 

Generative image Steganography based on GANs.- Partial blind proxy
re-signature scheme for mobile internet.- Information Flow-Based Security
Construction for Compositional Interface Automata.- Provably secure
server-assisted verification threshold proxy re-signature scheme.- ReJection:
A AST-based Reentrancy Vulnerability Detection Method.- Identity
authentication under Internet of everything based on edge computing.- STC:
Improving the Performance of Virtual Machines Based on Task
Classification.- A Method for Realizing Covert Communication at Router
Driving Layer.- A secure multi-party signature scheme based on trust
mechanism.- Virtual FPGA Placement with An Efficient Ant Colony
Optimization.- Identity-based threshold group signature scheme of Blockchain
verification.- ByteDroid: Android Malware Detection using Deep Learning on
Bytecode Sequences.- Research on Multidimensional System Security Assessment
Based on AHP and Gray Correlation.- Research on Software Network Key Nodes
Mining Methods Based on Complex Network.- Research and development of TPM
virtualization.- A Secure Certificateless Identity Authentication Scheme
Based on Blockchain.- A trust-based security research method for Internet of
things terminal.- A QoS&SLA-driven Multifaceted Trust Model for Cloud
Computing.- A Lossless Data hiding Scheme in Public Key Encrypted Domain
based on homomorphic Key-Switching.- A Detection Approach for Buffer Overflow
Vulnerability based on Data Control Flow Graph.- Outsourced Data Integrity
Auditing for Ecient Batch Dynamic Updates.- Secure Personal Health Records
Sharing based on Blockchain and IPFS.