소장자료

>>
소장자료
>
000 nam5i
001 2210080933582
003 DE-He213
005 20250321102103
007 cr nn 008mamaa
008 240103s2024 si | s |||| 0|eng d
020 a97898199933149978-981-99-9331-4
024 a10.1007/978-981-99-9331-42doi
040 a221008
050 aQA76.9.A25
072 aUR2bicssc
072 aUTN2bicssc
072 aCOM0530002bisacsh
072 aUR2thema
072 aUTN2thema
082 a005.8223
245 00 aFrontiers in Cyber Securityh[electronic resource] :b6th International Conference, FCS 2023, Chengdu, China, August 21–23, 2023, Revised Selected Papers /cedited by Haomiao Yang, Rongxing Lu.
250 a1st ed. 2024.
264 aSingapore :bSpringer Nature Singapore :bImprint: Springer,c2024.
300 aXV, 673 p. 174 illus., 143 illus. in color.bonline resource.
336 atextbtxt2rdacontent
337 acomputerbc2rdamedia
338 aonline resourcebcr2rdacarrier
347 atext filebPDF2rda
490 aCommunications in Computer and Information Science,x1865-0937 ;v1992
505 aBlockchain and Distributed Systems -- Secure Cross-chain Transaction for Medical Data Sharing in Blockchain-based Internet of Medical Things -- An blockchain-based proxy re-encryption scheme with cryptographic reverse firewall for IoV -- SCCT-DARS: Secure and Compliant Cryptocurrency Transactions in a Decentralized Anonymous Regulated System -- ODSC: A Unique Chameleon Hash-based Application Framework for Blockchain Smart Contracts -- Cross-chain Identity Authentication for BIoMT with Multi-chain Fusion Mode -- Blockchain-based signature scheme with cryptographic reverse firewalls for IoV -- Network Security and Privacy Protection -- A Hierarchical Asynchronous Federated Learning Privacy-Preserving Framework for IoVs -- A Secure Mutual Authentication Scheme for Wireless Communication -- A Multi-tab Webpage Fingerprinting Method Based on Multi-head Self-attention -- Improving Accuracy of Interactive Queries in Personalized Differential Privacy -- VPSearch+: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search without Client Storage Overhead -- Security-Enhanced Function Privacy Attribute-Based Encryption -- Certificateless Ring Signcryption Scheme with Conditional Privacy Protection in Smart Grid -- Byzantine-robust Privacy-preserving Federated Learning based on DT-PKC -- Updatable and Dynamic Searchable Symmetric Encryption Scheme with Forward and Backward Privacy -- Efficient and Secure Count Queries on Encrypted Genomic Data -- Automatic construction of knowledge graph for personal sensitive data -- Cryptography and Encryption Techniques -- Heterogeneous Aggregate Signature for Unmanned Aerial Vehicles -- Secure arbitrated quantum signature scheme with Bell state -- An Authorized Function Homomorphic Proxy Signature Scheme with Sampling Batch Verification -- ASEV: Anonymous and Scored-Based E-Voting Protocol on Blockchain -- A New Self-Dual-BKZ algorithm based on Lattice Sieving -- A Certificateless Designated Verifier Sanitizable Signature -- An Inner Product Function Encryption Scheme for Secure Distance Calculation -- Efficient Non-Interactive Zero-Knowledge Proof for Graph 3-Coloring Problem -- Cloud-Aided Scalable Revocable IBE with Ciphertext Update from Lattices in the Random Oracle Model -- Heterogeneous Signcryption Scheme With Equality Test for Internet of Vehicles -- An Improved Updatable Signature Scheme with Weakened Token -- A pairing-based certificateless authenticated searchable encryption with MTI guarantees -- Machine Learning and Security -- Anomaly detection method for integrated encrypted malicious traffic based on RFCNN-GRU -- TimeGAN: A Novel Solution to Imbalanced Encrypted Traffic Datasets -- Secure Steganography Scheme based on Steganography Generative Adversarial Network -- SR-GNN: Spectral Residuals with Graph Neural Networks for Anomaly Detection in ADS-B Data -- Learned Pseudo-Random Number Generator based on Generative Adversarial Networks -- An Intrusion Detection System Using Vision Transformer for Representation Learning -- PaBiL-Net: Parallel Bidirectional LSTM Network for Mobile Encrypted Traffic Classification -- A General Source Code Vulnerability Detection Method via Ensemble of Graph Neural Networks -- Federated Long-Tailed Learning by Retraining the Biased Classifier with Prototypes -- Internet of Things and System Security -- Ensuring SLA Compliance of Edge Enabled Cloud Service for IoT application: A Dynamic QoS-aware Scheme -- A Regenerating Code Based Data Restoration Scheme in Active RFID System -- Lightweight Privacy-Preserving Medical Diagnostic Scheme for Internet of Things Healthcare -- Windows Fuzzing Framework Based on Dynamic Tracing And Process Cloning -- Meta-HFMD: A Hierarchical Feature Fusion Malware Detection Framework via Multi-TaskMeta-Learning -- Privacy-Preserving Cloud-Edge Collaborative K-Means Clustering Model in IoT.
520 aThis volume constitutes the refereed proceedings of the 6th International Conference on Frontiers in Cyber Security, FCS 2023, held in Chengdu, China, in August 2023. The 44 full papers included in this book were carefully reviewed and selected from 89 submissions. They were organized in topical sections as follows: Blockchain and Distributed Systems; Network Security and Privacy Protection; Cryptography and Encryption Techniques; Machine Learning and Security; and Internet of Things and System Security.
650 aData protection.
650 aComputer engineering.
650 aComputer networks .
650 aArtificial intelligence.
650 aComputer networksxSecurity measures.
650 aData and Information Security.
650 aComputer Engineering and Networks.
650 aArtificial Intelligence.
650 aComputer Communication Networks.
650 aMobile and Network Security.
700 aYang, Haomiao.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
700 aLu, Rongxing.eeditor.4edt4http://id.loc.gov/vocabulary/relators/edt
710 aSpringerLink (Online service)
773 tSpringer Nature eBook
776 iPrinted edition:z9789819993307
776 iPrinted edition:z9789819993321
830 aCommunications in Computer and Information Science,x1865-0937 ;v1992
856 uhttps://doi.org/10.1007/978-981-99-9331-4
912 aZDB-2-SCS
912 aZDB-2-SXCS
950 aComputer Science (SpringerNature-11645)
950 aComputer Science (R0) (SpringerNature-43710)
Frontiers in Cyber Security[electronic resource] :6th International Conference, FCS 2023, Chengdu, China, August 21–23, 2023, Revised Selected Papers /edited by Haomiao Yang, Rongxing Lu
종류
전자책
서명
Frontiers in Cyber Security[electronic resource] :6th International Conference, FCS 2023, Chengdu, China, August 21–23, 2023, Revised Selected Papers /edited by Haomiao Yang, Rongxing Lu
저자명
판 사항
1st ed. 2024.
형태사항
XV, 673 p 174 illus, 143 illus in color online resource.
주기사항
This volume constitutes the refereed proceedings of the 6th International Conference on Frontiers in Cyber Security, FCS 2023, held in Chengdu, China, in August 2023. The 44 full papers included in this book were carefully reviewed and selected from 89 submissions. They were organized in topical sections as follows: Blockchain and Distributed Systems; Network Security and Privacy Protection; Cryptography and Encryption Techniques; Machine Learning and Security; and Internet of Things and System Security.
내용주기
Blockchain and Distributed Systems / Secure Cross-chain Transaction for Medical Data Sharing in Blockchain-based Internet of Medical Things / An blockchain-based proxy re-encryption scheme with cryptographic reverse firewall for IoV / SCCT-DARS: Secure and Compliant Cryptocurrency Transactions in a Decentralized Anonymous Regulated System / ODSC: A Unique Chameleon Hash-based Application Framework for Blockchain Smart Contracts / Cross-chain Identity Authentication for BIoMT with Multi-chain Fusion Mode / Blockchain-based signature scheme with cryptographic reverse firewalls for IoV / Network Security and Privacy Protection / A Hierarchical Asynchronous Federated Learning Privacy-Preserving Framework for IoVs / A Secure Mutual Authentication Scheme for Wireless Communication / A Multi-tab Webpage Fingerprinting Method Based on Multi-head Self-attention / Improving Accuracy of Interactive Queries in Personalized Differential Privacy / VPSearch+: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search without Client Storage Overhead / Security-Enhanced Function Privacy Attribute-Based Encryption / Certificateless Ring Signcryption Scheme with Conditional Privacy Protection in Smart Grid / Byzantine-robust Privacy-preserving Federated Learning based on DT-PKC / Updatable and Dynamic Searchable Symmetric Encryption Scheme with Forward and Backward Privacy / Efficient and Secure Count Queries on Encrypted Genomic Data / Automatic construction of knowledge graph for personal sensitive data / Cryptography and Encryption Techniques / Heterogeneous Aggregate Signature for Unmanned Aerial Vehicles / Secure arbitrated quantum signature scheme with Bell state / An Authorized Function Homomorphic Proxy Signature Scheme with Sampling Batch Verification / ASEV: Anonymous and Scored-Based E-Voting Protocol on Blockchain / A New Self-Dual-BKZ algorithm based on Lattice Sieving / A Certificateless Designated Verifier Sanitizable Signature / An Inner Product Function Encryption Scheme for Secure Distance Calculation / Efficient Non-Interactive Zero-Knowledge Proof for Graph 3-Coloring Problem / Cloud-Aided Scalable Revocable IBE with Ciphertext Update from Lattices in the Random Oracle Model / Heterogeneous Signcryption Scheme With Equality Test for Internet of Vehicles / An Improved Updatable Signature Scheme with Weakened Token / A pairing-based certificateless authenticated searchable encryption with MTI guarantees / Machine Learning and Security / Anomaly detection method for integrated encrypted malicious traffic based on RFCNN-GRU / TimeGAN: A Novel Solution to Imbalanced Encrypted Traffic Datasets / Secure Steganography Scheme based on Steganography Generative Adversarial Network / SR-GNN: Spectral Residuals with Graph Neural Networks for Anomaly Detection in ADS-B Data / Learned Pseudo-Random Number Generator based on Generative Adversarial Networks / An Intrusion Detection System Using Vision Transformer for Representation Learning / PaBiL-Net: Parallel Bidirectional LSTM Network for Mobile Encrypted Traffic Classification / A General Source Code Vulnerability Detection Method via Ensemble of Graph Neural Networks / Federated Long-Tailed Learning by Retraining the Biased Classifier with Prototypes / Internet of Things and System Security / Ensuring SLA Compliance of Edge Enabled Cloud Service for IoT application: A Dynamic QoS-aware Scheme / A Regenerating Code Based Data Restoration Scheme in Active RFID System / Lightweight Privacy-Preserving Medical Diagnostic Scheme for Internet of Things Healthcare / Windows Fuzzing Framework Based on Dynamic Tracing And Process Cloning / Meta-HFMD: A Hierarchical Feature Fusion Malware Detection Framework via Multi-TaskMeta-Learning / Privacy-Preserving Cloud-Edge Collaborative K-Means Clustering Model in IoT.
관련 URL

소장정보

도서예약
서가부재도서 신고
보존서고신청
캠퍼스대출
우선정리신청
검색지인쇄
등록번호 청구기호 별치기호 소장위치 대출상태 반납예정일 서비스
전자자료는 소장사항이 존재하지 않습니다

책소개

전체 메뉴 보기