Puzzle Zeitvertreib Beste 4K Filme Beste Multimedia-Lernspiele % SALE %

Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi'an China, October 23-25, 2


Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi'an China, October 23-25, 2
89.99 CHF
Versandkostenfrei

Lieferzeit: 7-14 Werktage

  • 10462142


Beschreibung

Detection of lurkers in Online Social Networks.- Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications.- Achieving Differential Privacy of Data Disclosure from Non-Intrusive Load Monitoring in Smart Grid.- Protecting in-memory data cache with secure enclaves in untrusted cloud.- A New Way for Extracting Region of Interest from Palmprint by Detecting Key Points.- An Anonymization Method to Improve Data Utility for Classification.- Efficient Privacy Preserving Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data.- A Fair Three-party Contract Singing Protocol Based on Blockchain.- Securely Outsourcing Decentralized Multi-authority Attribute Based Signature.- Efficient CCA2 Secure Revocable Multi-Authority Large-Universe Attribute-Based Encryption.- CloudDPI: Cloud-based Privacy-preserving Deep Packet Inspection via Reversible Sketch.- Cloud Data Integrity Checking with Deduplication for Confidential Data Storage.- Noisy Smoothing Image Source Identification.- Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment.- An Information Theory Based Approach for Identifying Inuential Spreaders in Temporal Networks.- Privacy-preserving Comparable Encryption Scheme in Cloud Computing.- Detecting Malicious Nodes in Medical Smartphone Networks through Euclidean Distance-based Behavioral Profiling.- Two-phase Locality-Sensitive Hashing for Privacy-preserving Distributed Service Recommendation.- Trusted Industry Control System based on Hardware Security Module.- A DP Canopy K-means Algorithm for Privacy Preservation of Hadoop Platform.- On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach.- HypTracker: A Hypervisor to Detect Malwares through System Call Analysis on ARM.- A Fibonacci based batch auditing protocol for cloud data.- A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance.- An Online Approach to Defeating Return-Oriented-Programming Attacks.- An Improved Authentication Scheme for the Integrated EPR Information System.- KGBIAC:Knowledge Graph Based Intelligent Alert Correlation Framework.- A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks through Fog Computing.- Predicting Vulnerable Software Components using software network graph.- My Smartphone Knows Your Health Data: Exploiting Android-Based Deception Attacks Against Smartbands.- A novel image encryption scheme using Josephus permutation and image Filtering.- Modeling and Hopf bifurcation analysis of benign worms with quarantine strategy.- Accountable Multi-Authority Ciphertext-Policy Attribute-Based Encryption without Key Escrow and Key Abuse.- Optimization of Cloud Workow Scheduling Based on Balanced Clustering.- DexPro: A Bytecode Level Code Protection System for Android Applications.- Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service.- Secure Role-based Access Control over Outsourced EMRs against Unwanted Leakage.- Users' Perceived Control, Trust and Expectation on Privacy Settings of Smartphone.

Eigenschaften

Breite: 157
Gewicht: 838 g
Höhe: 234
Länge: 27
Seiten: 532
Sprachen: Englisch
Autor: Aniello Castiglione, Sheng Wen, Wei Wu

Bewertung

Bewertungen werden nach Überprüfung freigeschaltet.

Die mit einem * markierten Felder sind Pflichtfelder.

Ich habe die Datenschutzbestimmungen zur Kenntnis genommen.

Zuletzt angesehen

eUniverse.ch - zur Startseite wechseln © 2021 Nova Online Media Retailing GmbH