|
|
|
|
LEADER |
05836nam a22004335i 4500 |
001 |
000291260 |
005 |
20210915183051.0 |
007 |
cr nn 008mamaa |
008 |
171206s2017 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319723891
|
024 |
7 |
|
|a 10.1007/978-3-319-72389-1
|2 doi
|
040 |
|
|
|a Sistema de Bibliotecas del Tecnológico de Costa Rica
|
245 |
1 |
0 |
|a Security, Privacy, and Anonymity in Computation, Communication, and Storage :
|b 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedings /
|c edited by Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo.
|
250 |
|
|
|a 1st ed. 2017.
|
260 |
# |
# |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
300 |
|
|
|a XVIII, 610 p. 200 illus. :
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Information Systems and Applications, incl. Internet/Web, and HCI ;
|v 10656
|
505 |
0 |
|
|a Optimized Analysis Based on Improved Mutation and Crossover Operator for Differential Evolution Algorithm -- Revisiting Localization Attacks in Mobile App People-Nearby Services -- Lengthening Unidimensional Continuous-variable Quantum Key Distribution with Noiseless Linear Amplifier -- Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext -- An Attack to an Anonymous Certi cateless Group Key Agreement Scheme and its Improvement -- A Space Effcient Algorithm for LCIS Problem -- Improving the Efficiency of Dynamic Programming in Big Data Computing -- Traceable and Complete Fine-Grained Revocable Multi-Authority Attribute-Based Encryption Scheme in Social Network -- The All Seeing Eye: Web to App Intercommunication for Session Fingerprinting in Android -- An Efficient Hierarchical Identity-Based Encryption Scheme for the Key Escrow -- An Improved Pre-Copy Transmission Algorithm in Mobile Cloud Computing -- Motivation of DDOS Attack-Aware Link Assignment between Switches to SDN Controllers -- TIM: A Trust Insurance Mechanism for Network Function Virtualization Based on Trusted Computing -- Personalized Semantic Location Privacy Preservation Algorithm Based on Query Processing Cost Optimization -- Smartphone Bloatware: An Overlooked Privacy Problem -- An ECC-Based off-line Anonymous Grouping-proof Protocol -- PCSD: A Tool for Android Malware Detection -- Authorship Analysis of Social Media Contents Using Tone and Personality Features -- Privacy-Preserving Handover Authentication Protocol from Lightweight Identity-Based Signature for Wireless Networks -- Spatial Outlier Information Hiding Algorithm Based on Complex Transformation -- A Reputation Model Considering Repurchase Behavior and Mechanism Design to Promote Repurchase -- Chinese Named Entity Recognition Based on B-LSTM Neural Network with Additional Features -- Amplified Locality-Sensitive Hashing for Privacypreserving Distributed Service Recommendation -- Learn to Accelerate Identifying New Test Cases in Fuzzing -- Service Selection Based on User Privacy Risk Evaluation -- An Efficient Lattice-Based Proxy Signature with Message Recovery -- FABAC: A Flexible Fuzzy Attribute-Based Access Control Mechanism -- Security Analysis and Improvement of An Anonymous Attribute-Based Proxy Re-encryption -- Relacha: Using Associative Meaning for Image Captcha Understandability -- Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces -- A Formal Android Permission Model Based on the B Method -- S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks -- MCloud: Efficient Monitoring Framework for Cloud Computing Platforms -- Secure Vibration Control of Flexible Arms based on Operators' Behaviors -- A New Color Image Encryption Scheme Based on Chaotic Hénon Map and Lü System -- A Distributed Authentication Protocol using Identity-based Encryption and Blockchain for LEO Network -- A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation -- A Unified Model for Detecting Privacy Leakage on Android -- Multi-party Security Computation with Differential Privacy Over Outsourced Data -- REW-SMT: A New Approach for Rewriting XACML Request with Dynamic Big Data Security Policies -- Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine Introspection -- Privacy Preserving Hierarchical Clustering over Multi-Party Data Distribution -- Improving MQTT by Inclusion of Usage Control -- Using JSON to Specify Privacy Preserving-enabled Attribute-based Access Control Policies -- Comprehensive Diversity in Recommender Systems -- Towards Intelligent System Wide Information Management for Air Traffic Management -- A Security Risk Management Model for Cloud Computing Systems: Infrastructure As A Service. .
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computers.
|
650 |
|
0 |
|a Computer organization.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Artificial intelligence.
|
650 |
1 |
4 |
|a Security.
|
650 |
2 |
4 |
|a Systems and Data Security.
|
650 |
2 |
4 |
|a Information Systems and Communication Service.
|
650 |
2 |
4 |
|a Computer Systems Organization and Communication Networks.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Artificial Intelligence.
|
700 |
1 |
|
|a Wang, Guojun.
|e editor.
|0 (orcid)0000-0001-9875-4182
|1 https://orcid.org/0000-0001-9875-4182
|
700 |
1 |
|
|a Atiquzzaman, Mohammed.
|e editor.
|
700 |
1 |
|
|a Yan, Zheng.
|e editor.
|0 (orcid)0000-0002-9697-2108
|1 https://orcid.org/0000-0002-9697-2108
|
700 |
1 |
|
|a Choo, Kim-Kwang Raymond.
|e editor.
|0 (orcid)0000-0001-9208-5336
|1 https://orcid.org/0000-0001-9208-5336
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|