1 option
Emerging Information Security and Applications : Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings / edited by Jiageng Chen, Debiao He, Rongxing Lu.
- Format:
- Book
- Series:
- Computer Science (SpringerNature-11645)
- Communications in computer and information science 1865-0937 ; 1641
- Communications in Computer and Information Science, 1865-0937 ; 1641
- Language:
- English
- Subjects (All):
- Computer engineering.
- Computer networks.
- Cryptography.
- Data encryption (Computer science).
- Artificial intelligence.
- Data protection.
- Computer networks-Security measures.
- Computer Engineering and Networks.
- Cryptology.
- Artificial Intelligence.
- Data and Information Security.
- Mobile and Network Security.
- Local Subjects:
- Computer Engineering and Networks.
- Cryptology.
- Artificial Intelligence.
- Data and Information Security.
- Mobile and Network Security.
- Physical Description:
- 1 online resource (X, 225 pages) : 69 illustrations, 51 illustrations in color.
- Edition:
- 1st ed. 2022.
- Contained In:
- Springer Nature eBook
- Place of Publication:
- Cham : Springer Nature Switzerland : Imprint: Springer, 2022.
- System Details:
- text file PDF
- Summary:
- This volume constitutes selected papers presented at the Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022. Due to COVID-19, EISA 2022 was held fully online. The 13 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. .
- Contents:
- Asymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
- A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks
- Towards Low-Latency Big Data Infrastructure at Sangfor
- Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB
- Parallel Validity Analysis of the Boomerang Attack Model
- A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography
- Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis without q-type assumption
- AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels
- HBMD-FL:Heterogeneous Federated Learning Algorithm Based On Blockchain and Model Distillation
- Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET
- An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy
- D2CDIM:DID-based Decentralized Cross-domain Identity Management with Privacy-Preservation and Sybil-Resistance
- Link Aware Aggregation Query with Privacy-preserving Capability in Wireless Sensor Networks.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-031-23098-1
- 9783031230981
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.