Cyberspace Safety and Security : 9th International Symposium, CSS 2017, Xi’an China, October 23–25, 2017, Proceedings /
Autor Corporativo: | |
---|---|
Otros Autores: | , , |
Formato: | eBook |
Lenguaje: | English |
Publicado: |
Cham :
Springer International Publishing : Imprint: Springer,
2017.
|
Edición: | 1st ed. 2017. |
Colección: | Security and Cryptology ;
10581 |
Materias: |
Tabla de Contenidos:
- Detection of lurkers in Online Social Networks
- Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications
- Achieving Differential Privacy of Data Disclosure from Non-Intrusive Load Monitoring in Smart Grid
- Protecting in-memory data cache with secure enclaves in untrusted cloud
- A New Way for Extracting Region of Interest from Palmprint by Detecting Key Points
- An Anonymization Method to Improve Data Utility for Classification
- Efficient Privacy Preserving Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data
- A Fair Three-party Contract Singing Protocol Based on Blockchain
- Securely Outsourcing Decentralized Multi-authority Attribute Based Signature
- Efficient CCA2 Secure Revocable Multi-Authority Large-Universe Attribute-Based Encryption
- CloudDPI: Cloud-based Privacy-preserving Deep Packet Inspection via Reversible Sketch
- Cloud Data Integrity Checking with Deduplication for Confidential Data Storage
- Noisy Smoothing Image Source Identification
- Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment
- An Information Theory Based Approach for Identifying Inuential Spreaders in Temporal Networks
- Privacy-preserving Comparable Encryption Scheme in Cloud Computing
- Detecting Malicious Nodes in Medical Smartphone Networks through Euclidean Distance-based Behavioral Profiling
- Two-phase Locality-Sensitive Hashing for Privacy-preserving Distributed Service Recommendation
- Trusted Industry Control System based on Hardware Security Module
- A DP Canopy K-means Algorithm for Privacy Preservation of Hadoop Platform
- On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach
- HypTracker: A Hypervisor to Detect Malwares through System Call Analysis on ARM
- A Fibonacci based batch auditing protocol for cloud data
- A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance
- An Online Approach to Defeating Return-Oriented-Programming Attacks
- An Improved Authentication Scheme for the Integrated EPR Information System
- KGBIAC:Knowledge Graph Based Intelligent Alert Correlation Framework
- A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks through Fog Computing
- Predicting Vulnerable Software Components using software network graph
- My Smartphone Knows Your Health Data: Exploiting Android-Based Deception Attacks Against Smartbands
- A novel image encryption scheme using Josephus permutation and image Filtering
- Modeling and Hopf bifurcation analysis of benign worms with quarantine strategy
- Accountable Multi-Authority Ciphertext-Policy Attribute-Based Encryption without Key Escrow and Key Abuse
- Optimization of Cloud Workow Scheduling Based on Balanced Clustering
- DexPro: A Bytecode Level Code Protection System for Android Applications
- Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service
- Secure Role-based Access Control over Outsourced EMRs against Unwanted Leakage
- Users' Perceived Control, Trust and Expectation on Privacy Settings of Smartphone. .