Trusted computing and information security : 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019, Revised selected papers /: 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019, Revised selected papers. (2020)
- Record Type:
- Book
- Title:
- Trusted computing and information security : 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019, Revised selected papers /: 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019, Revised selected papers. (2020)
- Main Title:
- Trusted computing and information security : 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019, Revised selected papers
- Other Titles:
- CTCIS 2019
- Further Information:
- Note: Weili Han, Liehuang Zhu, Fei Yan (eds.).
- Other Names:
- Han, Weili
Zhu, Liehuang
Yan, Fei
Chinese Conference on Trusted Computing and Information Security, 13th - Contents:
- Generative image Steganography based on GANs.- Partial blind proxy re-signature scheme for mobile internet.- Information Flow-Based Security Construction for Compositional Interface Automata.- Provably secure server-assisted verification threshold proxy re-signature scheme.- ReJection: A AST-based Reentrancy Vulnerability Detection Method.- Identity authentication under Internet of everything based on edge computing.- STC: Improving the Performance of Virtual Machines Based on Task Classification.- A Method for Realizing Covert Communication at Router Driving Layer.- A secure multi-party signature scheme based on trust mechanism.- Virtual FPGA Placement with An Efficient Ant Colony Optimization.- Identity-based threshold group signature scheme of Blockchain verification.- ByteDroid: Android Malware Detection using Deep Learning on Bytecode Sequences.- Research on Multidimensional System Security Assessment Based on AHP and Gray Correlation.- Research on Software Network Key Nodes Mining Methods Based on Complex Network.- Research and development of TPM virtualization.- A Secure Certificateless Identity Authentication Scheme Based on Blockchain.- A trust-based security research method for Internet of things terminal.- A QoS&SLA-driven Multifaceted Trust Model for Cloud Computing.- A Lossless Data hiding Scheme in Public Key Encrypted Domain based on homomorphic Key-Switching.- A Detection Approach for Buffer Overflow Vulnerability based on Data Control Flow Graph.- OutsourcedGenerative image Steganography based on GANs.- Partial blind proxy re-signature scheme for mobile internet.- Information Flow-Based Security Construction for Compositional Interface Automata.- Provably secure server-assisted verification threshold proxy re-signature scheme.- ReJection: A AST-based Reentrancy Vulnerability Detection Method.- Identity authentication under Internet of everything based on edge computing.- STC: Improving the Performance of Virtual Machines Based on Task Classification.- A Method for Realizing Covert Communication at Router Driving Layer.- A secure multi-party signature scheme based on trust mechanism.- Virtual FPGA Placement with An Efficient Ant Colony Optimization.- Identity-based threshold group signature scheme of Blockchain verification.- ByteDroid: Android Malware Detection using Deep Learning on Bytecode Sequences.- Research on Multidimensional System Security Assessment Based on AHP and Gray Correlation.- Research on Software Network Key Nodes Mining Methods Based on Complex Network.- Research and development of TPM virtualization.- A Secure Certificateless Identity Authentication Scheme Based on Blockchain.- A trust-based security research method for Internet of things terminal.- A QoS&SLA-driven Multifaceted Trust Model for Cloud Computing.- A Lossless Data hiding Scheme in Public Key Encrypted Domain based on homomorphic Key-Switching.- A Detection Approach for Buffer Overflow Vulnerability based on Data Control Flow Graph.- Outsourced Data Integrity Auditing for Efficient Batch Dynamic Updates.- Secure Personal Health Records Sharing based on Blockchain and IPFS. … (more)
- Publisher Details:
- Singapore : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource (367 pages)
- Subjects:
- 005.8
Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Computer networks -- Security measures
Computer security
Electronic books
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9789811534188
9811534187 - Related ISBNs:
- 9789811534171
- Notes:
- Note: Print version record.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.492270
- Ingest File:
- 03_055.xml