Security, privacy, and anonymity in computation, communication, and storage : SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings /: SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings. (2017)
- Record Type:
- Book
- Title:
- Security, privacy, and anonymity in computation, communication, and storage : SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings /: SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings. (2017)
- Main Title:
- Security, privacy, and anonymity in computation, communication, and storage : SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings
- Other Titles:
- SpaCCS 2017
- Further Information:
- Note: Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo (eds.).
- Editors:
- (Computer scientist), Wang, Guojun
Atiquzzaman, Mohammed
Yan, Zheng
Choo, Kim-Kwang Raymond - Other Names:
- SpaCCS (Conference), 10th
- Contents:
- The 9th IEEE International Symposium on UbiSafe Computing (UbiSafe 2017) -- MTIV: A Trustworthiness Determination Approach for Threat Intelligence -- CoDistributed Caching Based Memory Optimizing Technology for Stream Data of IoV -- Secure Transfer Protocol Between App and Device of Internet of Things -- Rogue Access Points Detection Based on Theory of SemiSupervised Learning -- Phishing Detection Method Based on Borderline-Smote Deep Belief Network -- Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field -- Security Review and Study of DoS Attack on DNS in the International Roaming EPC_LTE Network -- A SYN Flood Detection Method Based on Self ? similarity in Network Traffic -- Annotating Network Service Fault based on Temporal Interval Relations -- The 9th IEEE International Workshop on Security in e-Science and e-Research (ISSR 2017) -- An Anonymous Identity-Based Authentication Scheme in Vector Network -- The 8th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2017) -- Two Improved Anonymous Authentication Methods for PCS -- Multi-Match Segments Similarity Join Algorithm Based on MapReduce -- GPU-accelerated Histogram Generation on Smart-phone and Webbrowser -- An Efficient Message Routing Algorithm Using Overhearing in Community Opportunistic Networks -- A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping -- Game Theoretical AnalysisThe 9th IEEE International Symposium on UbiSafe Computing (UbiSafe 2017) -- MTIV: A Trustworthiness Determination Approach for Threat Intelligence -- CoDistributed Caching Based Memory Optimizing Technology for Stream Data of IoV -- Secure Transfer Protocol Between App and Device of Internet of Things -- Rogue Access Points Detection Based on Theory of SemiSupervised Learning -- Phishing Detection Method Based on Borderline-Smote Deep Belief Network -- Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field -- Security Review and Study of DoS Attack on DNS in the International Roaming EPC_LTE Network -- A SYN Flood Detection Method Based on Self ? similarity in Network Traffic -- Annotating Network Service Fault based on Temporal Interval Relations -- The 9th IEEE International Workshop on Security in e-Science and e-Research (ISSR 2017) -- An Anonymous Identity-Based Authentication Scheme in Vector Network -- The 8th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2017) -- Two Improved Anonymous Authentication Methods for PCS -- Multi-Match Segments Similarity Join Algorithm Based on MapReduce -- GPU-accelerated Histogram Generation on Smart-phone and Webbrowser -- An Efficient Message Routing Algorithm Using Overhearing in Community Opportunistic Networks -- A Reversible Watermarking for 2D Vector Map Based on Triple Differences Expansion and Reversible Contrast Mapping -- Game Theoretical Analysis on System Adoption and Acceptance: A Review -- A Novel Bivariate Entropy-based Network Anomaly Detection System -- The Full Provenance Stack: Five Layers for Complete and Meaningful Provenance -- Neural Network based Web Log Analysis for Web Intrusion Detection -- The 7th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2017) -- Code Abstractions for Automatic Information Flow Control in a Model-Driven Approach -- WaybackVisor: Hypervisor-based Scalable Live Forensic Architecture for Timeline Analysis -- Cloud Ownership and Reliability ? Issues and Developments -- A Trust-based Service Self-Organizing Model for Cloud Market -- A Reliable Resource Scheduling for Network Function Virtualization -- On Global Resource Allocation in Clusters for Data Analytics -- An Automatic Generation Method for Condition Expressions of CPN Model Focus on Tested Behaviors -- The 6th International Symposium on Security and Privacy on Internet of Things (SPIoT 2017) -- Analysing the Resilience of the Internet of Things against Physical and Proximity Attacks -- Ensuring IoT/M2M System Security under the Limitation of Constrained Gateways -- Spatial Reconfigurable Physical Unclonable Functions for the Internet of Things -- Localizing Wireless Jamming Attacks with Minimal Network Resources -- The 5th International Workshop on Network Optimization and Performance Evaluation (NOPE 2017) -- An Architecture of Urban Regional Health Information System and Its Data Conversion Algorithm -- CCN Hotspot Cache Placement Strategy Based on Genetic Algorithm -- The Impact of Routing Protocols on the Performance of a Mobility Model in Mobile Ad Hoc Network (MANET) -- A Comparative Study of Zynq-based OpenFlow Switches in a Software/Hardware Co-design -- Design and Implementation of a Low-cost Software De ned Wireless Network Testbed for Smart Home -- Energy-efficiency Aware Cooperative Caching Strategy for Content-centric Networks -- The 3rd International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications (DependSys 2017). -Password Recovery for ZIP Files Based on ARM-FPGA Cluster -- Comparison of Different Centrality Measures to Find Influential Nodes in Complex Networks -- An FPGA-based Algorithm to Accelerate Regular Expression Matching -- A Collaborative Filtering Recommendation Algorithm Based on Score Classification -- FluteDB: An Efficient and Dependable Time-Series Database Storage Engine -- Attacks on the Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud -- Research on Coupling Reliability Problem in Sensor- Cloud System -- An On-demand Monitoring Approach for Cloud Computing Systems -- Security on "A Lightweight Authentication Scheme with User Untraceability" -- A Security Scheme of Big Data Identity for Cloud Environment -- A Compact Construction for Non-monotonic Online/Offline CP-ABE scheme -- RPS-TSM: A Robot Perception System Based on Temporal Semantic Map -- MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data -- The Art of Using Cross-Layer Design in Cognitive Radio Networks -- A Quality Model for Evaluating Encryption-as-a-Service -- Forensic Detection for Image Operation Order: Resizing and Contrast Enhancement -- A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration -- Security and Attack Vector Analysis of IoT Devices -- Security Solution of RFID Card through Cryptography -- Grouping Users for Quick Recommendations of Text Documents based on Deep Neural Network -- Module-level Software Streaming Loading Model Based on Hypervisor -- The 3rd International Symposium on Sensor-Cloud Systems (SCS 2017) -- On-Street Car Parking Prediction in Smart City: A Multi-Source Data Analysis in Sensor-Cloud Environment -- A Weight-bind-based Safe Top-k Query Processing Scheme in Two-tiered Sensor Networks -- A Floorplanning Algorithm for Partially Reconfigurable FPGA in Wireless Sensor Network -- CO-TDMA: a TDMA Protocol for Collecting Data and OAP at the Same Time -- Cloud-assisted Data Storage and Query Processing at Vehicular Ad-hoc Sensor Networks -- EFAV-MERD: Expected Forwarding Area Volume and Residual Distance Mathematic Expectation Routing Protocol for UASNs -- The 2nd International Workshop on Cloud Storage Service and Computing (WCSSC 2017) -- Fast Truss Decomposition in Memory -- Pyramid:Revisiting Memory Extension with Remote Accessible Non-Volatile Main Memory -- Fully Decentralized Multi-Authority ABE Scheme in Data Sharing System -- Malware Variants Detection Using Density Based Spatial Clustering with Global Opcode Matrix -- Research on Graph Processing Systems on a Single Machine -- 3D Model Reconstruction with Sequence Image of Aircraft -- Construction Research on Information Platform for Small and Medium-sized Enterprises Based on Cloud Storage Technology -- XoT: A Flexible Block I/O Data Transfer Protocol for Xen -- The First International Symposium on Multimedia Security and Digital Forensics (MSDF 2017) -- Detecting Spliced Face using Texture Analysis -- Fine-grained, Multi-key Search Control in Multi-user Searchable Encryption -- Overview of Performance Evaluation of Keyword Search Utilities in Forensic/E-Discovery Software -- The 2017 International Symposium on Big Data and Machine Learning in Information Security, Privacy and Anonymity (SPBD 2017) -- Distribution Network Topology Reconstruction Method Based on Lasso and Its Supplementary Criterions. … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource (xviii, 610 pages), illustrations
- Subjects:
- 005.8
Computer science
Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Data protection -- Congresses
Computer networks -- Security measures
Computer security
Data protection
Computers -- Security -- General
Computers -- Online Services -- General
Computers -- Hardware -- General
Computers -- Intelligence (AI) & Semantics
Computer security
Computer networking & communications
Data encryption
Artificial intelligence
Data protection
Information systems
Data encryption (Computer science)
Computer network architectures
Artificial intelligence
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319723952
3319723952 - Related ISBNs:
- 9783319723945
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed December 20, 2017).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.341153
- Ingest File:
- 01_291.xml