Atjaunināt sīkdatņu piekrišanu

E-grāmata: Trusted Computing and Information Security: 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019, Revised Selected Papers

Edited by , Edited by , Edited by
  • Formāts - EPUB+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2019, held in Shanghai, China, in October 2019.

The 22 revised full papers presented were carefully reviewed and selected from 247 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, network security, information hiding. 

Generative image Steganography based on GANs.- Partial blind proxy
re-signature scheme for mobile internet.- Information Flow-Based Security
Construction for Compositional Interface Automata.- Provably secure
server-assisted verification threshold proxy re-signature scheme.- ReJection:
A AST-based Reentrancy Vulnerability Detection Method.- Identity
authentication under Internet of everything based on edge computing.- STC:
Improving the Performance of Virtual Machines Based on Task
Classification.- A Method for Realizing Covert Communication at Router
Driving Layer.- A secure multi-party signature scheme based on trust
mechanism.- Virtual FPGA Placement with An Efficient Ant Colony
Optimization.- Identity-based threshold group signature scheme of Blockchain
verification.- ByteDroid: Android Malware Detection using Deep Learning on
Bytecode Sequences.- Research on Multidimensional System Security Assessment
Based on AHP and Gray Correlation.- Research on Software Network Key Nodes
Mining Methods Based on Complex Network.- Research and development of TPM
virtualization.- A Secure Certificateless Identity Authentication Scheme
Based on Blockchain.- A trust-based security research method for Internet of
things terminal.- A QoS&SLA-driven Multifaceted Trust Model for Cloud
Computing.- A Lossless Data hiding Scheme in Public Key Encrypted Domain
based on homomorphic Key-Switching.- A Detection Approach for Buffer Overflow
Vulnerability based on Data Control Flow Graph.- Outsourced Data Integrity
Auditing for Ecient Batch Dynamic Updates.- Secure Personal Health Records
Sharing based on Blockchain and IPFS.