Security, Privacy, and Anonymity in Computation, Communication, and Storage : SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings /

Detalles Bibliográficos
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Wang, Guojun. (Editor ), Atiquzzaman, Mohammed. (Editor ), Yan, Zheng. (Editor ), Choo, Kim-Kwang Raymond. (Editor )
Formato: eBook
Lenguaje:English
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2017.
Edición:1st ed. 2017.
Colección:Information Systems and Applications, incl. Internet/Web, and HCI ; 10658
Materias:
Tabla de Contenidos:
  • The 9th IEEE International Symposium on UbiSafe Computing (UbiSafe 2017)
  • MTIV: A Trustworthiness Determination Approach for Threat Intelligence
  • CoDistributed Caching Based Memory Optimizing Technology for Stream Data of IoV
  • Secure Transfer Protocol Between App and Device of Internet of Things
  • Rogue Access Points Detection Based on Theory of SemiSupervised Learning
  • Phishing Detection Method Based on Borderline-Smote Deep Belief Network
  • Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field
  • Security Review and Study of DoS Attack on DNS in the International Roaming EPC_LTE Network
  • A SYN Flood Detection Method Based on Self – similarity in Network Traffic
  • Annotating Network Service Fault based on Temporal Interval Relations
  • The 9th IEEE International Workshop on Security in e-Science and e-Research (ISSR 2017)
  • An Anonymous Identity-Based Authentication Scheme in Vector Network
  • The 8th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2017)
  • Two Improved Anonymous Authentication Methods for PCS
  • Multi-Match Segments Similarity Join Algorithm Based on MapReduce
  • GPU-accelerated Histogram Generation on Smart-phone and Webbrowser
  • An Efficient Message Routing Algorithm Using Overhearing in Community Opportunistic Networks
  • A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping
  • Game Theoretical Analysis on System Adoption and Acceptance: A Review
  • A Novel Bivariate Entropy-based Network Anomaly Detection System
  • The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance
  • Neural Network based Web Log Analysis for Web Intrusion Detection
  • The 7th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2017)
  • Code Abstractions for Automatic Information Flow Control in a Model-Driven Approach
  • WaybackVisor: Hypervisor-based Scalable Live Forensic Architecture for Timeline Analysis
  • Cloud Ownership and Reliability – Issues and Developments
  • A Trust-based Service Self-Organizing Model for Cloud Market
  • A Reliable Resource Scheduling for Network Function Virtualization
  • On Global Resource Allocation in Clusters for Data Analytics
  • An Automatic Generation Method for Condition Expressions of CPN Model Focus on Tested Behaviors
  • The 6th International Symposium on Security and Privacy on Internet of Things (SPIoT 2017)
  • Analysing the Resilience of the Internet of Things against Physical and Proximity Attacks
  • Ensuring IoT/M2M System Security under the Limitation of Constrained Gateways
  • Spatial Reconfigurable Physical Unclonable Functions for the Internet of Things
  • Localizing Wireless Jamming Attacks with Minimal Network Resources
  • The 5th International Workshop on Network Optimization and Performance Evaluation (NOPE 2017)
  • An Architecture of Urban Regional Health Information System and Its Data Conversion Algorithm
  • CCN Hotspot Cache Placement Strategy Based on Genetic Algorithm
  • The Impact of Routing Protocols on the Performance of a Mobility Model in Mobile Ad Hoc Network (MANET)
  • A Comparative Study of Zynq-based OpenFlow Switches in a Software/Hardware Co-design
  • Design and Implementation of a Low-cost Software De ned Wireless Network Testbed for Smart Home
  • Energy-efficiency Aware Cooperative Caching Strategy for Content-centric Networks
  • The 3rd International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2017). -Password Recovery for ZIP Files Based on ARM-FPGA Cluster
  • Comparison of Different Centrality Measures to Find Influential Nodes in Complex Networks
  • An FPGA-based Algorithm to Accelerate Regular Expression Matching
  • A Collaborative Filtering Recommendation Algorithm Based on Score Classification
  • FluteDB: An Efficient and Dependable Time-Series Database Storage Engine
  • Attacks on the Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
  • Research on Coupling Reliability Problem in Sensor- Cloud System
  • An On-demand Monitoring Approach for Cloud Computing Systems
  • Security on "A Lightweight Authentication Scheme with User Untraceability"
  • A Security Scheme of Big Data Identity for Cloud Environment
  • A Compact Construction for Non-monotonic Online/Offline CP-ABE scheme
  • RPS-TSM: A Robot Perception System Based on Temporal Semantic Map
  • MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data
  • The Art of Using Cross-Layer Design in Cognitive Radio Networks
  • A Quality Model for Evaluating Encryption-as-a-Service
  • Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement
  • A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration
  • Security and Attack Vector Analysis of IoT Devices
  • Security Solution of RFID Card through Cryptography
  • Grouping Users for Quick Recommendations of Text Documents based on Deep Neural Network
  • Module-level Software Streaming Loading Model Based on Hypervisor
  • The 3rd International Symposium on Sensor-Cloud Systems (SCS 2017)
  • On-Street Car Parking Prediction in Smart City: A Multi-Source Data Analysis in Sensor-Cloud Environment
  • A Weight-bind-based Safe Top-k Query Processing Scheme in Two-tiered Sensor Networks
  • A Floorplanning Algorithm for Partially Reconfigurable FPGA in Wireless Sensor Network
  • CO-TDMA: a TDMA Protocol for Collecting Data and OAP at the Same Time
  • Cloud-assisted Data Storage and Query Processing at Vehicular Ad-hoc Sensor Networks
  • EFAV-MERD: Expected Forwarding Area Volume and Residual Distance Mathematic Expectation Routing Protocol for UASNs
  • The 2nd International Workshop on Cloud Storage Service and Computing (WCSSC 2017)
  • Fast Truss Decomposition in Memory
  • Pyramid:Revisiting Memory Extension with Remote Accessible Non-Volatile Main Memory
  • Fully Decentralized Multi-Authority ABE Scheme in Data Sharing System
  • Malware Variants Detection Using Density Based Spatial Clustering with Global Opcode Matrix
  • Research on Graph Processing Systems on a Single Machine
  • 3D Model Reconstruction with Sequence Image of Aircraft
  • Construction Research on Information Platform for Small and Medium-sized Enterprises Based on Cloud Storage Technology
  • XoT: A Flexible Block I/O Data Transfer Protocol for Xen
  • The First International Symposium on Multimedia Security and Digital Forensics (MSDF 2017)
  • Detecting Spliced Face using Texture Analysis
  • Fine-grained, Multi-key Search Control in Multi-user Searchable Encryption
  • Overview of Performance Evaluation of Keyword Search Utilities in Forensic/E-Discovery Software
  • The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity (SPBD 2017)
  • Distribution Network Topology Reconstruction Method Based on Lasso and Its Supplementary Criterions.