Security, privacy, and anonymity in computation, communication, and storage : 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings /: 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings. (2018)
- Record Type:
- Book
- Title:
- Security, privacy, and anonymity in computation, communication, and storage : 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings /: 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings. (2018)
- Main Title:
- Security, privacy, and anonymity in computation, communication, and storage : 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings
- Other Titles:
- SpaCCS 2018
- Further Information:
- Note: Guojun Wang, Jinjun Chen, Laurence T. Yang (eds.).
- Editors:
- (Computer scientist), Wang, Guojun
Chen, Jinjun
Yang, Laurence Tianruo - Other Names:
- SpaCCS (Conference), 11th
- Contents:
- Protecting Your Smartphone from Theft Using Accelerometer -- SOS -- Securing Open Skies DNS Traffic of a Tor Exit Node -- An Analysis -- SDN-Based Secure VANETs Communication with Fog Computing -- Wearable Device Data for Criminal Investigation -- Authentication of Skyline Query over Road Networks -- A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing -- Processing Analysis of Confidential Modes of Operation -- Matching Sensor Ontologies through Compact Evolutionary Tabu Search Algorithm -- Event-triggered Fault-detection Filter using Coordinate Transformation Approach for Time-varying Stochastic Systems -- Indoor Interference Classification Based on WiFi Channel State Information -- Secure and Privacy Preserving RFID Based Access Control to Smart Buildings -- Answering the Min-cost Quality-aware Query on Multi-sources in Sensor-Cloud Systems -- Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud Environment -- A Four-stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Application of Sensor-Cloud Systems: Smart Traffic Control -- Strategy-Proof Mechanism for Provisioning Nonobedient Resources Without Payment -- Risk Identification-based Association Rule Mining for Supply Chain Big Data -- TrCMP: An App Usage Inference Method for Mobile Service Enhancement -- A High-performance Adaptive Strategy ofProtecting Your Smartphone from Theft Using Accelerometer -- SOS -- Securing Open Skies DNS Traffic of a Tor Exit Node -- An Analysis -- SDN-Based Secure VANETs Communication with Fog Computing -- Wearable Device Data for Criminal Investigation -- Authentication of Skyline Query over Road Networks -- A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing -- Processing Analysis of Confidential Modes of Operation -- Matching Sensor Ontologies through Compact Evolutionary Tabu Search Algorithm -- Event-triggered Fault-detection Filter using Coordinate Transformation Approach for Time-varying Stochastic Systems -- Indoor Interference Classification Based on WiFi Channel State Information -- Secure and Privacy Preserving RFID Based Access Control to Smart Buildings -- Answering the Min-cost Quality-aware Query on Multi-sources in Sensor-Cloud Systems -- Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud Environment -- A Four-stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Application of Sensor-Cloud Systems: Smart Traffic Control -- Strategy-Proof Mechanism for Provisioning Nonobedient Resources Without Payment -- Risk Identification-based Association Rule Mining for Supply Chain Big Data -- TrCMP: An App Usage Inference Method for Mobile Service Enhancement -- A High-performance Adaptive Strategy of Container Checkpoint Based on Pre-replication -- Cloud Enabled e-glossary System: A Smart Campus Perspective -- A Dynamic Integrity Transitivity Model for the Cloud -- Enhancing Dependability in Big Data Analytics Enterprise Pipelines -- Overview of Logistics Equilibrium Distribution Networks System: An Urban Perspective -- CRAB: Blockchain Based Criminal Record Management System -- Secure Passive Keyless Entry and Start System Using Machine Learning -- Towards New Privacy Regulations in Europe: Users' Privacy Perception in Recommender Systems -- SafeTECKS: Protect Data Safety in Things-Edge-Cloud Architecture with Knowledge Sharing -- NTRDM: A New Bus Line Network Optimization Method Based on Taxi Passenger Flow Conversion -- BDCP:A Framework for Big Data Copyright Protection Based on Digital Watermarking -- A Privacy-preserving Attribute-Based Access Control Scheme -- Checking an Authentication of Person Depends on RFID with Thermal Image -- Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social Networks -- An efficient provable multi-copy data possession scheme with data dynamics -- An Enhanced Key Management Scheme for LoRaWAN -- Identifying Devices of the Internet of Things using Machine Learning on Clock Characteristics -- A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical Systems -- Interacting with the Internet of Things using Smart Contracts and Blockchain Technologies -- Research on Multi-Focus Image Fusion Algorithm Based on Quadtree -- Uncertainty Evaluation for Big Data of Mass Standards in a Key Comparison -- Research on Wireless Spectrum Sensing Technology Based on Machine Learning -- The Safety Detection for Double Tapered Roller Bearing Based on Deep Learning -- Malicious Domain Name Recognition Based on Deep Neural Networks -- Investigation on Unauthorized Human Activity Watching through Leveraging Wi-Fi Signals -- E2STA: An Energy-Efficient Spatio-Temporal Query Algorithm for Wireless Sensor Networks. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (xv, 534 pages), illustrations (some color)
- Subjects:
- 005.8
Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Data protection -- Congresses
Computer networks -- Security measures
Computer security
Data protection
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783030053451
3030053458 - Related ISBNs:
- 9783030053444
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed December 18, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.380824
- Ingest File:
- 02_368.xml