My Account Log in

1 option

Emerging Information Security and Applications : Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings / edited by Jiageng Chen, Debiao He, Rongxing Lu.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Chen, Jiageng, Editor.
He, Debiao, Editor.
Lu, Rongxing, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
Communications in computer and information science 1865-0937 ; 1641
Communications in Computer and Information Science, 1865-0937 ; 1641
Language:
English
Subjects (All):
Computer engineering.
Computer networks.
Cryptography.
Data encryption (Computer science).
Artificial intelligence.
Data protection.
Computer networks-Security measures.
Computer Engineering and Networks.
Cryptology.
Artificial Intelligence.
Data and Information Security.
Mobile and Network Security.
Local Subjects:
Computer Engineering and Networks.
Cryptology.
Artificial Intelligence.
Data and Information Security.
Mobile and Network Security.
Physical Description:
1 online resource (X, 225 pages) : 69 illustrations, 51 illustrations in color.
Edition:
1st ed. 2022.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer Nature Switzerland : Imprint: Springer, 2022.
System Details:
text file PDF
Summary:
This volume constitutes selected papers presented at the Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022. Due to COVID-19, EISA 2022 was held fully online. The 13 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. .
Contents:
Asymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks
Towards Low-Latency Big Data Infrastructure at Sangfor
Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB
Parallel Validity Analysis of the Boomerang Attack Model
A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography
Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis without q-type assumption
AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels
HBMD-FL:Heterogeneous Federated Learning Algorithm Based On Blockchain and Model Distillation
Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET
An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy
D2CDIM:DID-based Decentralized Cross-domain Identity Management with Privacy-Preservation and Sybil-Resistance
Link Aware Aggregation Query with Privacy-preserving Capability in Wireless Sensor Networks.
Other Format:
Printed edition:
ISBN:
978-3-031-23098-1
9783031230981
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account