Liu / Huang | Network and System Security | E-Book | sack.de
E-Book

E-Book, Englisch, Band 11928, 731 Seiten, eBook

Reihe: Lecture Notes in Computer Science

Liu / Huang Network and System Security

13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings
Erscheinungsjahr 2019
ISBN: 978-3-030-36938-5
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark

13th International Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019, Proceedings

E-Book, Englisch, Band 11928, 731 Seiten, eBook

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-030-36938-5
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark



This book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019. The 36 full papers and 7 short papers presented together with 4 invited papers in this book were carefully reviewed and selected from 89 initial submissions. The papers cover a wide range of topics in the field, including authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.
Liu / Huang Network and System Security jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Invited Papers.- Measuring Security of Symmetric Encryption Schemes against On-the-Fly Side-Channel Key-Recovery Attacks.- Unsupervised Insider Detection through Neural Feature Learning and Model Optimisation.- Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey.- A Graph Database-based Approach to Analyze Network Log Files.- Full Papers.- A Privacy-Enhancing Framework for Internet of Things Services.- Using Audio Characteristics for Mobile Device Authentication.- Ethereum Analysis via Node Clustering.- Strong Known Related-Key Attacks and the Security of ECDSA.- Threat Assessment of Enterprise Applications via Graphical Modelling.- A Blockchain-based IoT Data Management System for Secure and Scalable Data Sharing.- Towards Secure Open Banking Architecture: An Evaluation with OWASP.- OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms.- OVERSCAN: OAuth 2.0 Scanner for Missing Parameters.- LaT-Voting: Traceable Anonymous E-Voting on Blockchain.- Distributed Secure Storage System Based on Blockchain and TPA.- SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique.- A Practical Dynamic Enhanced BFT protocol.- Pre-adjustment Based Anti-collusion Mechanism for Audio Signals.- Detecting Intruders by User File Access Patterns.- Blockchain-enabled Privacy-preserving Internet of Vehicles: Decentralized and Reputation-based Network Architecture.- Privacy Preserving Machine Learning with Limited Information Leakage.- Blockchain based Owner-Controlled Secure Software Updates for Resource-Constrained.- Sequential Aggregate MACs with Detecting Functionality Revisited.- A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System.- EEG-based Authentication with Variational Universal Background Model.- An Efficient Vulnerability Detection Model for Ethereum Smart Contracts.- A Comparative Study on Network Traffic Clustering.- Tell Them From Me: an Encrypted Application Profiler.- Indoor Security Localization Algorithm Based on Location Discrimination Ability of AP.- Gnocchi: Multiplexed Payment Channels for Cryptocurrencies.- Difficulty of decentralized structure due to rational user behavior on Blockchain.- A DNS Tunneling Detection method based on Deep Learning models to prevent Data Exfiltration.- Cryptanalysis of Raindrop and FBC.- Attribute Based Encryption with Publicly Verifiable Outsourced Decryption.- New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defense Cost.- Lattice based verifiably encrypted double authentication preventing Signatures.- Privacy-Preserving Sequential Data Publishing.- A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter.- Keyed Non-Parametric Hypothesis Tests: Protecting Machine Learning From Poisoning Attacks.- SparkDA: RDD-Based High Performance Data AnonymizationTechnique for Spark Platform.- Short Papers.- An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol.- Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices.- Privacy-preserving k-means clustering: an application to driving style Recognition.- Derandomized PACE with Mutual Authentication.- A Muti-attributes-based Trust Model of Internet of Vehicle.- Using Sparse Composite Document Vectors to Classify VBA Macros.- A High-Performance Hybrid Blockchain Systemfor Traceable IoT Applications.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.