My Account Log in

1 option

Science of Cyber Security - SciSec 2022 Workshops : AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 10-12, 2022, Revised Selected Papers / edited by Chunhua Su, Kouichi Sakurai.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Su, Chunhua, Editor.
Sakurai, Kouichi, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
Communications in computer and information science 1865-0937 ; 1680
Communications in Computer and Information Science, 1865-0937 ; 1680
Language:
English
Subjects (All):
Data protection.
Computer engineering.
Computer networks.
Artificial intelligence.
Data and Information Security.
Computer Engineering and Networks.
Artificial Intelligence.
Local Subjects:
Data and Information Security.
Computer Engineering and Networks.
Artificial Intelligence.
Physical Description:
1 online resource (X, 227 pages) : 71 illustrations, 49 illustrations in color.
Edition:
1st ed. 2022.
Contained In:
Springer Nature eBook
Place of Publication:
Singapore : Springer Nature Singapore : Imprint: Springer, 2022.
System Details:
text file PDF
Summary:
This volume constitutes the papers of several workshops which were held in conjunction with the 4th International Conference on Science of Cyber Security Workshops, SciSec 2022, held in Matsue, Japan, in August 10-12, 2022. The 15 revised full papers and 3 posters were presented in this book were carefully reviewed and selected from 30 submissions.They were organized in topical sections as follows: AI Crypto and Security Workshop (AI-CryptoSec); Theory and Application of Blockchain and NFT Workshop (TA-BC-NFT); and Mathematical Science of Quantum Safety and its Application Workshop (MathSci-Qsafe).
Contents:
AI Crypto and Security Workshop (AI-CryptoSec)
Image Data Recoverability against Data Collaboration and its Countermeasure
Human Security Behavior Assistance in the Cyber-physical Space
A Privacy-preserving Electricity Theft Detection (PETD) Scheme for Smart Grid
Design and implementation of VCP network for Open Flow
Theory and Application of Blockchain and NFT Workshop (TA-BC-NFT)
Medical waste treatment process based on Blockchain technology - a case study of Covid-19 waste handling in Vietnam
Blockchain technology-based management of blood and its products - a case study in Vietnam
Application of the elimination competition mechanism based on blockchain multi-supervision in vehicle data sharing
Economic Perspective of Cybersecurity: Principles and Strategies
Towards a Dynamic Reputation Management Scheme for Cross-chain Transactions
Mathematical Science of Quantum Safety and its Application Workshop (MathSci-Qsafe)
Revisiting Security of Symmetric-Key Encryption with Imperfect Randomness and Correlation between Source and Keys
A Secure Image-Video Retrieval Scheme with Attribute-Based Encryption and Multi-Feature Fusion in Smart Grid
A Survey on Privacy Preserving Synthetic Data Generation and a Discussion on a Privacy-Utility Trade-off Problem
Multi-Client Private Decision Tree Classification using Threshold Fully Homomorphic Encryption
Advances in adversarial attacks and defenses in Intrusion Detection System: A survey
Zero-touch Provisioned Device Lifecycle and Its Security in IoT
Activation Code Delivery on V2X Pseudonym Certificate Revocation
Federated Active Learning.
Other Format:
Printed edition:
ISBN:
978-981-19-7769-5
9789811977695
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account