My Account Log in

1 option

Cyberspace Safety and Security : 9th International Symposium, CSS 2017, Xi'an China, October 23-25, 2017, Proceedings / edited by Sheng Wen, Wei Wu, Aniello Castiglione.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Wen, Sheng (Computer scientist), editor.
Wu, Wei (Computer scientist), editor.
Castiglione, Aniello, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 10581.
Security and Cryptology ; 10581
Language:
English
Subjects (All):
Computer security.
Computer networks.
Data encryption (Computer science).
Computers and civilization.
Systems and Data Security.
Computer Communication Networks.
Cryptology.
Computers and Society.
Local Subjects:
Systems and Data Security.
Computer Communication Networks.
Cryptology.
Computers and Society.
Physical Description:
1 online resource (XIV, 532 pages) : 182 illustrations.
Edition:
First edition 2017.
Contained In:
Springer eBooks
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2017.
System Details:
text file PDF
Summary:
This book constitutes the proceedings of the 9th International Symposium on Cyberspace Safety and Security, CSS 2017, held in Xi'an, China in October 2017. The 31 full papers and 10 short papers presented in this volume were carefully reviewed and selected from 120 submissions. The papers focus on cyberspace safety and security such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.
Contents:
Detection of lurkers in Online Social Networks
Static Taint Analysis Method for Intent Injection Vulnerability in Android Applications
Achieving Differential Privacy of Data Disclosure from Non-Intrusive Load Monitoring in Smart Grid
Protecting in-memory data cache with secure enclaves in untrusted cloud
A New Way for Extracting Region of Interest from Palmprint by Detecting Key Points
An Anonymization Method to Improve Data Utility for Classification
Efficient Privacy Preserving Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data
A Fair Three-party Contract Singing Protocol Based on Blockchain
Securely Outsourcing Decentralized Multi-authority Attribute Based Signature
Efficient CCA2 Secure Revocable Multi-Authority Large-Universe Attribute-Based Encryption
CloudDPI: Cloud-based Privacy-preserving Deep Packet Inspection via Reversible Sketch
Cloud Data Integrity Checking with Deduplication for Confidential Data Storage
Noisy Smoothing Image Source Identification
Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment
An Information Theory Based Approach for Identifying Inuential Spreaders in Temporal Networks
Privacy-preserving Comparable Encryption Scheme in Cloud Computing
Detecting Malicious Nodes in Medical Smartphone Networks through Euclidean Distance-based Behavioral Profiling
Two-phase Locality-Sensitive Hashing for Privacy-preserving Distributed Service Recommendation
Trusted Industry Control System based on Hardware Security Module
A DP Canopy K-means Algorithm for Privacy Preservation of Hadoop Platform
On Using Wearable Devices to Steal Your Passwords: A Fuzzy Inference Approach
HypTracker: A Hypervisor to Detect Malwares through System Call Analysis on ARM
A Fibonacci based batch auditing protocol for cloud data
A WeChat User Geolocating Algorithm Based on the Relation Between Reported and Actual Distance
An Online Approach to Defeating Return-Oriented-Programming Attacks
An Improved Authentication Scheme for the Integrated EPR Information System
KGBIAC:Knowledge Graph Based Intelligent Alert Correlation Framework
A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks through Fog Computing
Predicting Vulnerable Software Components using software network graph
My Smartphone Knows Your Health Data: Exploiting Android-Based Deception Attacks Against Smartbands
A novel image encryption scheme using Josephus permutation and image Filtering
Modeling and Hopf bifurcation analysis of benign worms with quarantine strategy
Accountable Multi-Authority Ciphertext-Policy Attribute-Based Encryption without Key Escrow and Key Abuse
Optimization of Cloud Workow Scheduling Based on Balanced Clustering
DexPro: A Bytecode Level Code Protection System for Android Applications
Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service
Secure Role-based Access Control over Outsourced EMRs against Unwanted Leakage
Users' Perceived Control, Trust and Expectation on Privacy Settings of Smartphone. .
Other Format:
Printed edition:
ISBN:
978-3-319-69471-9
9783319694719
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account