Security, Privacy, and Anonymity in Computation, Communication, and Storage : SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings /
Autor Corporativo: | |
---|---|
Otros Autores: | , , , |
Formato: | eBook |
Lenguaje: | English |
Publicado: |
Cham :
Springer International Publishing : Imprint: Springer,
2017.
|
Edición: | 1st ed. 2017. |
Colección: | Information Systems and Applications, incl. Internet/Web, and HCI ;
10658 |
Materias: |
Tabla de Contenidos:
- The 9th IEEE International Symposium on UbiSafe Computing (UbiSafe 2017)
- MTIV: A Trustworthiness Determination Approach for Threat Intelligence
- CoDistributed Caching Based Memory Optimizing Technology for Stream Data of IoV
- Secure Transfer Protocol Between App and Device of Internet of Things
- Rogue Access Points Detection Based on Theory of SemiSupervised Learning
- Phishing Detection Method Based on Borderline-Smote Deep Belief Network
- Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field
- Security Review and Study of DoS Attack on DNS in the International Roaming EPC_LTE Network
- A SYN Flood Detection Method Based on Self – similarity in Network Traffic
- Annotating Network Service Fault based on Temporal Interval Relations
- The 9th IEEE International Workshop on Security in e-Science and e-Research (ISSR 2017)
- An Anonymous Identity-Based Authentication Scheme in Vector Network
- The 8th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2017)
- Two Improved Anonymous Authentication Methods for PCS
- Multi-Match Segments Similarity Join Algorithm Based on MapReduce
- GPU-accelerated Histogram Generation on Smart-phone and Webbrowser
- An Efficient Message Routing Algorithm Using Overhearing in Community Opportunistic Networks
- A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping
- Game Theoretical Analysis on System Adoption and Acceptance: A Review
- A Novel Bivariate Entropy-based Network Anomaly Detection System
- The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance
- Neural Network based Web Log Analysis for Web Intrusion Detection
- The 7th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2017)
- Code Abstractions for Automatic Information Flow Control in a Model-Driven Approach
- WaybackVisor: Hypervisor-based Scalable Live Forensic Architecture for Timeline Analysis
- Cloud Ownership and Reliability – Issues and Developments
- A Trust-based Service Self-Organizing Model for Cloud Market
- A Reliable Resource Scheduling for Network Function Virtualization
- On Global Resource Allocation in Clusters for Data Analytics
- An Automatic Generation Method for Condition Expressions of CPN Model Focus on Tested Behaviors
- The 6th International Symposium on Security and Privacy on Internet of Things (SPIoT 2017)
- Analysing the Resilience of the Internet of Things against Physical and Proximity Attacks
- Ensuring IoT/M2M System Security under the Limitation of Constrained Gateways
- Spatial Reconfigurable Physical Unclonable Functions for the Internet of Things
- Localizing Wireless Jamming Attacks with Minimal Network Resources
- The 5th International Workshop on Network Optimization and Performance Evaluation (NOPE 2017)
- An Architecture of Urban Regional Health Information System and Its Data Conversion Algorithm
- CCN Hotspot Cache Placement Strategy Based on Genetic Algorithm
- The Impact of Routing Protocols on the Performance of a Mobility Model in Mobile Ad Hoc Network (MANET)
- A Comparative Study of Zynq-based OpenFlow Switches in a Software/Hardware Co-design
- Design and Implementation of a Low-cost Software De ned Wireless Network Testbed for Smart Home
- Energy-efficiency Aware Cooperative Caching Strategy for Content-centric Networks
- The 3rd International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2017). -Password Recovery for ZIP Files Based on ARM-FPGA Cluster
- Comparison of Different Centrality Measures to Find Influential Nodes in Complex Networks
- An FPGA-based Algorithm to Accelerate Regular Expression Matching
- A Collaborative Filtering Recommendation Algorithm Based on Score Classification
- FluteDB: An Efficient and Dependable Time-Series Database Storage Engine
- Attacks on the Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud
- Research on Coupling Reliability Problem in Sensor- Cloud System
- An On-demand Monitoring Approach for Cloud Computing Systems
- Security on "A Lightweight Authentication Scheme with User Untraceability"
- A Security Scheme of Big Data Identity for Cloud Environment
- A Compact Construction for Non-monotonic Online/Offline CP-ABE scheme
- RPS-TSM: A Robot Perception System Based on Temporal Semantic Map
- MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data
- The Art of Using Cross-Layer Design in Cognitive Radio Networks
- A Quality Model for Evaluating Encryption-as-a-Service
- Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement
- A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration
- Security and Attack Vector Analysis of IoT Devices
- Security Solution of RFID Card through Cryptography
- Grouping Users for Quick Recommendations of Text Documents based on Deep Neural Network
- Module-level Software Streaming Loading Model Based on Hypervisor
- The 3rd International Symposium on Sensor-Cloud Systems (SCS 2017)
- On-Street Car Parking Prediction in Smart City: A Multi-Source Data Analysis in Sensor-Cloud Environment
- A Weight-bind-based Safe Top-k Query Processing Scheme in Two-tiered Sensor Networks
- A Floorplanning Algorithm for Partially Reconfigurable FPGA in Wireless Sensor Network
- CO-TDMA: a TDMA Protocol for Collecting Data and OAP at the Same Time
- Cloud-assisted Data Storage and Query Processing at Vehicular Ad-hoc Sensor Networks
- EFAV-MERD: Expected Forwarding Area Volume and Residual Distance Mathematic Expectation Routing Protocol for UASNs
- The 2nd International Workshop on Cloud Storage Service and Computing (WCSSC 2017)
- Fast Truss Decomposition in Memory
- Pyramid:Revisiting Memory Extension with Remote Accessible Non-Volatile Main Memory
- Fully Decentralized Multi-Authority ABE Scheme in Data Sharing System
- Malware Variants Detection Using Density Based Spatial Clustering with Global Opcode Matrix
- Research on Graph Processing Systems on a Single Machine
- 3D Model Reconstruction with Sequence Image of Aircraft
- Construction Research on Information Platform for Small and Medium-sized Enterprises Based on Cloud Storage Technology
- XoT: A Flexible Block I/O Data Transfer Protocol for Xen
- The First International Symposium on Multimedia Security and Digital Forensics (MSDF 2017)
- Detecting Spliced Face using Texture Analysis
- Fine-grained, Multi-key Search Control in Multi-user Searchable Encryption
- Overview of Performance Evaluation of Keyword Search Utilities in Forensic/E-Discovery Software
- The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity (SPBD 2017)
- Distribution Network Topology Reconstruction Method Based on Lasso and Its Supplementary Criterions.