Free shipping on orders over $99
Security and Privacy in New Computing Environments

Security and Privacy in New Computing Environments

4th EAI International Conference, SPNCE 2021, Virtual Event, December 10-11, 2021, Proceedings

by Wenbo ShiXiaofeng Chen and Kim-Kwang Raymond Choo
Paperback
Publication Date: 13/03/2022

Share This Book:

  $166.84
or 4 easy payments of $41.71 with
afterpay
This item qualifies your order for FREE DELIVERY
Blockchain-based Outsourcing Shared Car Risk Prediction Scheme Design.- Fairness Protection Method of Vickery Auction Based on Smart Contract.- An Improved Needham-Schroeder Session Key Distribution Protocol For In-Vehicle CAN Network.- Research on Two-Party Cooperative Aigis-sig Digital Signature Protocol.- An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection.- A Lightweight PSIS Scheme Based on Multi-Node Collaboration in the IoT.- SAD: Website Fingerprint Defense based on Adversarial Examples.- A privacy-aware and time-limited data access control scheme with large universe and public traceability for Cloud-based IoD.- Multi-Party High-Dimensional Related Data Publishing via Probabilistic Principal Component Analysis and Differential Privacy.- ource code vulnerability detection method with multidimensional representation.- A Security Enhanced Verification Framework Based on Device Fingerprint in Internet of Things.- RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient.- Linear Policy Recommender Scheme for Large-Scale Attribute-based Access Control.- Non-interactive Privacy-preserving Naive Bayes Classifier Using Homomorphic Encryption.- BA-Audit: blockchain-based public auditing for aggregated data sharing in edge-assisted IoT.- Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System.- Threat Detection-Oriented Network Security Situation Assessment Method.- System Business Affecting Impact Analysis Method with Crossover Probability Theory.- RAP: A Lightweight Application Layer Defense against Website Fingerprinting.- FL-iotDP: Differential Private Federated Neural Network.- Analysis of Vulnerability of IPsec Protocol Implementation Based on Differential Fuzzing.- Honeywords Generation Method Based on Deep Learning and Rule-based Password Attack.- Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning.- GLV/GLS Scalar Multiplication on Twisted Edwards Curves.- Online Privacy of Personal Information - Perceptions v Reality.- ARTPHIL: Reversible de-identification of free-text using an integrated model Bayan.- CAFM: Precise Classication for Android Family Malware.
ISBN:
9783030967901
9783030967901
Category:
Network hardware
Format:
Paperback
Publication Date:
13-03-2022
Language:
English
Publisher:
Springer International Publishing AG
Country of origin:
Switzerland
Dimensions (mm):
235x155mm
Weight:
0.63kg

This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 2 - 3 weeks of you placing an order.

Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.

Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:

ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days

Reviews

Be the first to review Security and Privacy in New Computing Environments.