E-Book, Englisch, Band 1149, 356 Seiten, eBook
Han / Zhu / Yan Trusted Computing and Information Security
Erscheinungsjahr 2020
ISBN: 978-981-15-3418-8
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark
13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24–27, 2019, Revised Selected Papers
E-Book, Englisch, Band 1149, 356 Seiten, eBook
Reihe: Communications in Computer and Information Science
ISBN: 978-981-15-3418-8
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Generative image Steganography based on GANs.- Partial blind proxy re-signature scheme for mobile internet.- Information Flow-Based Security Construction for Compositional Interface Automata.- Provably secure server-assisted verification threshold proxy re-signature scheme.- ReJection: A AST-based Reentrancy Vulnerability Detection Method.- Identity authentication under Internet of everything based on edge computing.- STC: Improving the Performance of Virtual Machines Based on Task Classification.- A Method for Realizing Covert Communication at Router Driving Layer.- A secure multi-party signature scheme based on trust mechanism.- Virtual FPGA Placement with An Efficient Ant Colony Optimization.- Identity-based threshold group signature scheme of Blockchain verification.- ByteDroid: Android Malware Detection using Deep Learning on Bytecode Sequences.- Research on Multidimensional System Security Assessment Based on AHP and Gray Correlation.- Research on Software Network Key Nodes Mining Methods Based on Complex Network.- Research and development of TPM virtualization.- A Secure Certificateless Identity Authentication Scheme Based on Blockchain.- A trust-based security research method for Internet of things terminal.- A QoS&SLA-driven Multifaceted Trust Model for Cloud Computing.- A Lossless Data hiding Scheme in Public Key Encrypted Domain based on homomorphic Key-Switching.- A Detection Approach for Buffer Overflow Vulnerability based on Data Control Flow Graph.- Outsourced Data Integrity Auditing for E?cient Batch Dynamic Updates.- Secure Personal Health Records Sharing based on Blockchain and IPFS.