Buch, Englisch, Band 1726, 430 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 668 g
5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings
Buch, Englisch, Band 1726, 430 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 668 g
Reihe: Communications in Computer and Information Science
ISBN: 978-981-19-8444-0
Verlag: Springer Nature Singapore
The 26 full papers were included in this book were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: ioT Security; artificial intelligence and cyber security; blockchain technology and application; cryptography; database security; quantum cryptography; and network security.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz
Weitere Infos & Material
IoT Security.- A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT.- A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles.- LightGBM-RF: A Hybrid Model for Anomaly Detection in Smart Building.- Enabling Hidden Frequency Keyword-Based Auditing on Distributed Architectures for a Smart Government.- A Lightweight Certificateless Searchable Public Key Encryption Scheme for Medical Internet of Things.- Artificial Intelligence and Cyber Security.- Cross-site Scripting Threat Intelligence Detection based on Deep Learning.- Power Analysis Attack Based on Lightweight Convolutional Neural Network.- Enhancing Port Scans Attack Detection Using Principal Component Analysis and Machine Learning Algorithms.- SVFLS: A Secure and Verifiable Federated Learning Training Scheme.- A Pragmatic Label-Specific Backdoor Attack.- Threat Landscape Across Multiple Cloud Service Providers Using Honeypots as an Attack Source.- Blockchain Technology and Application.- AP-HBSG: Authentication Protocol for Heterogeneous Blockchain-based Smart Grid environment.- Blockchain-based Patient-to-Patient Health Data Sharing.- Efficient and Automatic Pseudonym Management Scheme for VANET with Blockchain.- Ethereum Contract Honeypot Risk Analysis.- A Gas Cost Analytical Approach based on Certificateless Key Encapsulation Protocol for Medicalized blockchains.- Cryptography.- A Universal Lightweight Privacy-Preserving Multifunctional Data Handling Scheme.- New Trapdoor and Preimage Sampling on NTRU Lattice.- Secure EHR Sharing Scheme Based on Limited Sanitizable Signature.- A Rotating Multi-Secret Color Visual Cryptography Scheme Based on Meaningful Shares.- Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage.- Database Security.- A Comparative Analysis of Security Features and Concerns in NoSQL Databases Scheme.- Improving Online Restore Performance of Backup Storage via Historical File Access Pattern.- Securely and Efficiently Nearest Neighbor Query Scheme Based on Additive Secret Sharing.- Quantum Cryptography.- Quantum Information Splitting Scheme of Arbitrary Three-qubit State by Using a Four-qubit Cluster State and a Bell sate.- Network Security.- A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage Based Vehicle Intrusion Detection System.