Trusted Computing and Information Security : 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers /: 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers. (2019)
- Record Type:
- Book
- Title:
- Trusted Computing and Information Security : 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers /: 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers. (2019)
- Main Title:
- Trusted Computing and Information Security : 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers
- Further Information:
- Note: Huanguo Zhang, Bo Zhao, Fei Yan.
- Editors:
- Zhang, Huanguo
Zhao, Bo
Yan, Fei - Contents:
- Ciphertext-Policy Attribute-Based Encryption for Circuits from Lattices under Weak Security Model.- Impossible Differential Cryptanalysis of SPECK.- Detect Peer-To-Peer Botnet with Permutation Entropy and Adaptive Information Fusion.- Research of Snort Rule Extension and APT Detection Based on APT Network Behavior Analysis.- Network Risk Assessment Method Based on Asset Correlation Graph.- Password Guessing Based on Semantic Analysis and Neural Networks.- An Approach of Implementing SW-TPM in Real-Time Operating System.- A Multilevel Trusted Clustering Mechanism for the Awareness Layer of the Internet of Things.- A Multi-Layer Virtual Network Isolation Detection Method for Cloud Platform.- A Behavioral Measurement Model Suitable for the Sensing Nodes of Internet of Things.- An Efficient and Revocable Decentralizing Attribute-Based Encryption for Mobile Cloud Computing.- A Voting Scheme in Blockchain Based on Threshold Group Signature.- HABKS: Hierarchical Attribute-Based Keyword Search on Outsourcing Data.- A Trusted Measurement Model for Mobile Internet.- A Fast Identity Authentication Solution for the Sensing Layer in Internet of Things.- Cryptanalysis of an ElGamal-like Cryptosystem Based on Matrices over Group Rings.- An Analysis About the Defects of Windows UAC Mechanism.- A Privacy Protection Scheme in VANETs Based on Group Signature.- Analysis of Wireless Sensor Networks Behavior for Trustworthiness Evaluation.- Digging Evidence for Violation of Cloud SecurityCiphertext-Policy Attribute-Based Encryption for Circuits from Lattices under Weak Security Model.- Impossible Differential Cryptanalysis of SPECK.- Detect Peer-To-Peer Botnet with Permutation Entropy and Adaptive Information Fusion.- Research of Snort Rule Extension and APT Detection Based on APT Network Behavior Analysis.- Network Risk Assessment Method Based on Asset Correlation Graph.- Password Guessing Based on Semantic Analysis and Neural Networks.- An Approach of Implementing SW-TPM in Real-Time Operating System.- A Multilevel Trusted Clustering Mechanism for the Awareness Layer of the Internet of Things.- A Multi-Layer Virtual Network Isolation Detection Method for Cloud Platform.- A Behavioral Measurement Model Suitable for the Sensing Nodes of Internet of Things.- An Efficient and Revocable Decentralizing Attribute-Based Encryption for Mobile Cloud Computing.- A Voting Scheme in Blockchain Based on Threshold Group Signature.- HABKS: Hierarchical Attribute-Based Keyword Search on Outsourcing Data.- A Trusted Measurement Model for Mobile Internet.- A Fast Identity Authentication Solution for the Sensing Layer in Internet of Things.- Cryptanalysis of an ElGamal-like Cryptosystem Based on Matrices over Group Rings.- An Analysis About the Defects of Windows UAC Mechanism.- A Privacy Protection Scheme in VANETs Based on Group Signature.- Analysis of Wireless Sensor Networks Behavior for Trustworthiness Evaluation.- Digging Evidence for Violation of Cloud Security Compliance with Knowledge Learned from Logs.- Two Anti-Quantum Attack Protocols for Secure multiparty Computation.- A Cloud Storage Data Access Control Scheme Based on Attribute-Sets Encryption.- Detecting Malicious URLs Using a Deep Learning Approach Based on Stacked Denoising Autoencoder.- Predicting Vulnerable Software Components via Bellwethers. … (more)
- Publisher Details:
- Singapore : Springer
- Publication Date:
- 2019
- Copyright Date:
- 2019
- Extent:
- 1 online resource (410 pages)
- Subjects:
- Computer science
Computer security
Data encryption (Computer science)
Computer Communication Networks
Computers -- Security -- General
Computers -- Information Technology
Computers -- Hardware -- Network Hardware
Coding theory & cryptology
Computer security
Information retrieval
Network hardware - Languages:
- English
- ISBNs:
- 9789811359132
- Related ISBNs:
- 9789811359125
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.408503
- Ingest File:
- 02_493.xml