Cyberspace Safety and Security : 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings /

Detalles Bibliográficos
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Wen, Sheng. (Editor ), Wu, Wei. (Editor ), Castiglione, Aniello. (Editor )
Formato: eBook
Lenguaje:English
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2017.
Edición:1st ed. 2017.
Colección:Security and Cryptology ; 10581
Materias:
LEADER 04548nam a22003735i 4500
001 000280893
005 20210630152556.0
007 cr nn 008mamaa
008 171022s2017 gw | s |||| 0|eng d
020 |a 9783319694719 
024 7 |a 10.1007/978-3-319-69471-9  |2 doi 
040 |a Sistema de Bibliotecas del Tecnológico de Costa Rica 
245 1 0 |a Cyberspace Safety and Security :  |b 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings /  |c edited by Sheng Wen, Wei Wu, Aniello Castiglione. 
250 |a 1st ed. 2017. 
260 # # |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2017. 
300 |a XIV, 532 p. 182 illus. :  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Security and Cryptology ;  |v 10581 
505 0 |a Detection of lurkers in Online Social Networks -- Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications -- Achieving Differential Privacy of Data Disclosure from Non-Intrusive Load Monitoring in Smart Grid -- Protecting in-memory data cache with secure enclaves in untrusted cloud -- A New Way for Extracting Region of Interest from Palmprint by Detecting Key Points -- An Anonymization Method to Improve Data Utility for Classification -- Efficient Privacy Preserving Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data -- A Fair Three-party Contract Singing Protocol Based on Blockchain -- Securely Outsourcing Decentralized Multi-authority Attribute Based Signature -- Efficient CCA2 Secure Revocable Multi-Authority Large-Universe Attribute-Based Encryption -- CloudDPI: Cloud-based Privacy-preserving Deep Packet Inspection via Reversible Sketch -- Cloud Data Integrity Checking with Deduplication for Confidential Data Storage -- Noisy Smoothing Image Source Identification -- Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment -- An Information Theory Based Approach for Identifying Inuential Spreaders in Temporal Networks -- Privacy-preserving Comparable Encryption Scheme in Cloud Computing -- Detecting Malicious Nodes in Medical Smartphone Networks through Euclidean Distance-based Behavioral Profiling -- Two-phase Locality-Sensitive Hashing for Privacy-preserving Distributed Service Recommendation -- Trusted Industry Control System based on Hardware Security Module -- A DP Canopy K-means Algorithm for Privacy Preservation of Hadoop Platform -- On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach -- HypTracker: A Hypervisor to Detect Malwares through System Call Analysis on ARM -- A Fibonacci based batch auditing protocol for cloud data -- A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance -- An Online Approach to Defeating Return-Oriented-Programming Attacks -- An Improved Authentication Scheme for the Integrated EPR Information System -- KGBIAC:Knowledge Graph Based Intelligent Alert Correlation Framework -- A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks through Fog Computing -- Predicting Vulnerable Software Components using software network graph -- My Smartphone Knows Your Health Data: Exploiting Android-Based Deception Attacks Against Smartbands -- A novel image encryption scheme using Josephus permutation and image Filtering -- Modeling and Hopf bifurcation analysis of benign worms with quarantine strategy -- Accountable Multi-Authority Ciphertext-Policy Attribute-Based Encryption without Key Escrow and Key Abuse -- Optimization of Cloud Workow Scheduling Based on Balanced Clustering -- DexPro: A Bytecode Level Code Protection System for Android Applications -- Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service -- Secure Role-based Access Control over Outsourced EMRs against Unwanted Leakage -- Users' Perceived Control, Trust and Expectation on Privacy Settings of Smartphone.  . 
650 0 |a Computer security. 
650 0 |a Computer communication systems. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computers and civilization. 
650 1 4 |a Systems and Data Security. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Cryptology. 
650 2 4 |a Computers and Society. 
700 1 |a Wen, Sheng.  |e editor. 
700 1 |a Wu, Wei.  |e editor. 
700 1 |a Castiglione, Aniello.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks