E-Book, Englisch, Band 10581, 532 Seiten, eBook
Wen / Wu / Castiglione Cyberspace Safety and Security
1. Auflage 2017
ISBN: 978-3-319-69471-9
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings
E-Book, Englisch, Band 10581, 532 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-319-69471-9
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Detection of lurkers in Online Social Networks.- Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications.- Achieving Differential Privacy of Data Disclosure from Non-Intrusive Load Monitoring in Smart Grid.- Protecting in-memory data cache with secure enclaves in untrusted cloud.- A New Way for Extracting Region of Interest from Palmprint by Detecting Key Points.- An Anonymization Method to Improve Data Utility for Classification.- Efficient Privacy Preserving Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data.- A Fair Three-party Contract Singing Protocol Based on Blockchain.- Securely Outsourcing Decentralized Multi-authority Attribute Based Signature.- Efficient CCA2 Secure Revocable Multi-Authority Large-Universe Attribute-Based Encryption.- CloudDPI: Cloud-based Privacy-preserving Deep Packet Inspection via Reversible Sketch.- Cloud Data Integrity Checking with Deduplication for Confidential Data Storage.- Noisy Smoothing Image Source Identification.- Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment.- An Information Theory Based Approach for Identifying Inuential Spreaders in Temporal Networks.- Privacy-preserving Comparable Encryption Scheme in Cloud Computing.- Detecting Malicious Nodes in Medical Smartphone Networks through Euclidean Distance-based Behavioral Profiling.- Two-phase Locality-Sensitive Hashing for Privacy-preserving Distributed Service Recommendation.- Trusted Industry Control System based on Hardware Security Module.- A DP Canopy K-means Algorithm for Privacy Preservation of Hadoop Platform.- On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach.- HypTracker: A Hypervisor to Detect Malwares through System Call Analysis on ARM.- A Fibonacci based batch auditing protocol for cloud data.- A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance.- An Online Approach to Defeating Return-Oriented-Programming Attacks.- An Improved Authentication Scheme for the Integrated EPR Information System.- KGBIAC:Knowledge Graph Based Intelligent Alert Correlation Framework.- A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks through Fog Computing.- Predicting Vulnerable Software Components using software network graph.- My Smartphone Knows Your Health Data: Exploiting Android-Based Deception Attacks Against Smartbands.- A novel image encryption scheme using Josephus permutation and image Filtering.- Modeling and Hopf bifurcation analysis of benign worms with quarantine strategy.- Accountable Multi-Authority Ciphertext-Policy Attribute-Based Encryption without Key Escrow and Key Abuse.- Optimization of Cloud Workow Scheduling Based on Balanced Clustering.- DexPro: A Bytecode Level Code Protection System for Android Applications.- Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service.- Secure Role-based Access Control over Outsourced EMRs against Unwanted Leakage.- Users' Perceived Control, Trust and Expectation on Privacy Settings of Smartphone.