E-Book, Englisch, Band 960, 410 Seiten, eBook
Zhang / Zhao / Yan Trusted Computing and Information Security
Erscheinungsjahr 2019
ISBN: 978-981-13-5913-2
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark
12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers
E-Book, Englisch, Band 960, 410 Seiten, eBook
Reihe: Communications in Computer and Information Science
ISBN: 978-981-13-5913-2
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Ciphertext-Policy Attribute-Based Encryption for Circuits from Lattices under Weak Security Model.- Impossible Differential Cryptanalysis of SPECK.- Detect Peer-To-Peer Botnet with Permutation Entropy and Adaptive Information Fusion.- Research of Snort Rule Extension and APT Detection Based on APT Network Behavior Analysis.- Network Risk Assessment Method Based on Asset Correlation Graph.- Password Guessing Based on Semantic Analysis and Neural Networks.- An Approach of Implementing SW-TPM in Real-Time Operating System.- A Multilevel Trusted Clustering Mechanism for the Awareness Layer of the Internet of Things.- A Multi-Layer Virtual Network Isolation Detection Method for Cloud Platform.- A Behavioral Measurement Model Suitable for the Sensing Nodes of Internet of Things.- An Efficient and Revocable Decentralizing Attribute-Based Encryption for Mobile Cloud Computing.- A Voting Scheme in Blockchain Based on Threshold Group Signature.- HABKS: Hierarchical Attribute-Based Keyword Search on Outsourcing Data.- A Trusted Measurement Model for Mobile Internet.- A Fast Identity Authentication Solution for the Sensing Layer in Internet of Things.- Cryptanalysis of an ElGamal-like Cryptosystem Based on Matrices over Group Rings.- An Analysis About the Defects of Windows UAC Mechanism.- A Privacy Protection Scheme in VANETs Based on Group Signature.- Analysis of Wireless Sensor Networks Behavior for Trustworthiness Evaluation.- Digging Evidence for Violation of Cloud Security Compliance with Knowledge Learned from Logs.- Two Anti-Quantum Attack Protocols for Secure multiparty Computation.- A Cloud Storage Data Access Control Scheme Based on Attribute-Sets Encryption.- Detecting Malicious URLs Using a Deep Learning Approach Based on Stacked Denoising Autoencoder.- Predicting Vulnerable Software Components via Bellwethers.