E-Book, Englisch, Band 1663, 366 Seiten, eBook
Chen / Huang / Kutylowski Security and Privacy in Social Networks and Big Data
1. Auflage 2022
ISBN: 978-981-19-7242-3
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark
8th International Symposium, SocialSec 2022, Xi'an, China, October 16–18, 2022, Proceedings
E-Book, Englisch, Band 1663, 366 Seiten, eBook
Reihe: Communications in Computer and Information Science
ISBN: 978-981-19-7242-3
Verlag: Springer Singapore
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Cryptography and its applications.- Improved (t,n)-Threshold Proxy Signature Scheme.- Algorithm Substitution Attacks on Identity-Based Encryption.- Authenticated Continuous Top-k Spatial Keyword Search on Dynamic Objects.- Efficient Attribute-based Proxy Re-encryption for Secure Deduplication.- A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryption.- D2D Authentication Scheme for IoT-enabled Smart Home.- Inner Product Encryption from Middle-Product Learning with Errors.- Network security and privacy protection.- Publicly Verifiable Private Set Intersection from Homomorphic Encryption.- Secure Asynchronous Federated Learning for Edge Computing Devices.- FedBC: An Efficient and Privacy-preserving Federated Consensus Scheme.- A Secure and Privacy-preserving Authentication Scheme in IoMT.- Secure and Efficient k-Nearest Neighbor Query with Privacy-Preserving Authentication.- A Network Security Situation Assessment Method Based on Multi-attention Mechanism and HHO-ResNeXt.- A Privacy-Preserving Federated Learning with Mutual Verification on Vector Spaces.- Data detection.- Patch-based Backdoors Detection and Mitigation with Feature Masking.- Detection and Defense Against DDoS Attack on SDN Controller Based on Feature Selection.- Commodity-Tra: A Traceable Transaction Scheme Based on FISCO BCOS.- A Defect Heterogeneous Risk Assessment Method with Misclassification Cost.- Squeeze-Loss: A Utility-Free Defense Against Membership Inference Attacks.- Blockchain and its applications.- Improved WAVE Signature and Apply to Post-Quantum Blockchain.- Secure Government Data Sharing Based on Blockchain and Attribute-Based Encryption.- Secure Data Storage Scheme of Judicial System based on Blockchain.- Judicial Evidence Storage Scheme Based on Smart Contract.