Cyberspace safety and security : 9th International Symposium, CSS 2017, Xi'an China, October 23-25, 2017, Proceedings /: 9th International Symposium, CSS 2017, Xi'an China, October 23-25, 2017, Proceedings. (2017)
- Record Type:
- Book
- Title:
- Cyberspace safety and security : 9th International Symposium, CSS 2017, Xi'an China, October 23-25, 2017, Proceedings /: 9th International Symposium, CSS 2017, Xi'an China, October 23-25, 2017, Proceedings. (2017)
- Main Title:
- Cyberspace safety and security : 9th International Symposium, CSS 2017, Xi'an China, October 23-25, 2017, Proceedings
- Other Titles:
- CSS 2017
- Further Information:
- Note: Sheng Wen, Wei Wu, Aniello Castiglione (eds.).
- Editors:
- Wen, Sheng
Wu, Wei
Castiglione, Aniello - Other Names:
- International Symposium on Cyberspace Safety and Security, 9th
- Contents:
- Detection of lurkers in Online Social Networks -- Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications -- Achieving Differential Privacy of Data Disclosure from Non-Intrusive Load Monitoring in Smart Grid -- Protecting in-memory data cache with secure enclaves in untrusted cloud -- A New Way for Extracting Region of Interest from Palmprint by Detecting Key Points -- An Anonymization Method to Improve Data Utility for Classification -- Efficient Privacy Preserving Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data -- A Fair Three-party Contract Singing Protocol Based on Blockchain -- Securely Outsourcing Decentralized Multi-authority Attribute Based Signature -- Efficient CCA2 Secure Revocable Multi-Authority Large-Universe Attribute-Based Encryption -- CloudDPI: Cloud-based Privacy-preserving Deep Packet Inspection via Reversible Sketch -- Cloud Data Integrity Checking with Deduplication for Confidential Data Storage -- Noisy Smoothing Image Source Identification -- Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment -- An Information Theory Based Approach for Identifying Inuential Spreaders in Temporal Networks -- Privacy-preserving Comparable Encryption Scheme in Cloud Computing -- Detecting Malicious Nodes in Medical Smartphone Networks through Euclidean Distance-based Behavioral Profiling -- Two-phase Locality-Sensitive Hashing for Privacy-preserving Distributed ServiceDetection of lurkers in Online Social Networks -- Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications -- Achieving Differential Privacy of Data Disclosure from Non-Intrusive Load Monitoring in Smart Grid -- Protecting in-memory data cache with secure enclaves in untrusted cloud -- A New Way for Extracting Region of Interest from Palmprint by Detecting Key Points -- An Anonymization Method to Improve Data Utility for Classification -- Efficient Privacy Preserving Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data -- A Fair Three-party Contract Singing Protocol Based on Blockchain -- Securely Outsourcing Decentralized Multi-authority Attribute Based Signature -- Efficient CCA2 Secure Revocable Multi-Authority Large-Universe Attribute-Based Encryption -- CloudDPI: Cloud-based Privacy-preserving Deep Packet Inspection via Reversible Sketch -- Cloud Data Integrity Checking with Deduplication for Confidential Data Storage -- Noisy Smoothing Image Source Identification -- Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment -- An Information Theory Based Approach for Identifying Inuential Spreaders in Temporal Networks -- Privacy-preserving Comparable Encryption Scheme in Cloud Computing -- Detecting Malicious Nodes in Medical Smartphone Networks through Euclidean Distance-based Behavioral Profiling -- Two-phase Locality-Sensitive Hashing for Privacy-preserving Distributed Service Recommendation -- Trusted Industry Control System based on Hardware Security Module -- A DP Canopy K-means Algorithm for Privacy Preservation of Hadoop Platform -- On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach -- HypTracker: A Hypervisor to Detect Malwares through System Call Analysis on ARM -- A Fibonacci based batch auditing protocol for cloud data -- A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance -- An Online Approach to Defeating Return-Oriented-Programming Attacks -- An Improved Authentication Scheme for the Integrated EPR Information System -- KGBIAC:Knowledge Graph Based Intelligent Alert Correlation Framework -- A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks through Fog Computing -- Predicting Vulnerable Software Components using software network graph -- My Smartphone Knows Your Health Data: Exploiting Android-Based Deception Attacks Against Smartbands -- A novel image encryption scheme using Josephus permutation and image Filtering -- Modeling and Hopf bifurcation analysis of benign worms with quarantine strategy -- Accountable Multi-Authority Ciphertext-Policy Attribute-Based Encryption without Key Escrow and Key Abuse -- Optimization of Cloud Workow Scheduling Based on Balanced Clustering -- DexPro: A Bytecode Level Code Protection System for Android Applications -- Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service -- Secure Role-based Access Control over Outsourced EMRs against Unwanted Leakage -- Users' Perceived Control, Trust and Expectation on Privacy Settings of Smartphone. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource (xiv, 532 pages), illustrations
- Subjects:
- 005.8
Computer science
Computer security -- Congresses
Internet -- Security measures -- Congresses
Computer security
Internet -- Security measures
Computers -- Hardware -- Network Hardware
Computers -- Security -- General
Computers -- Social Aspects -- General
Network hardware
Coding theory & cryptology
Ethical & social aspects of IT
Computer security
Computer Communication Networks
Data encryption (Computer science)
Computer security
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319694719
3319694715 - Related ISBNs:
- 9783319694702
3319694707 - Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed October 30, 2017).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.366742
- Ingest File:
- 01_342.xml