000 07442nam a22006615i 4500
001 978-3-319-72389-1
003 DE-He213
005 20240730174721.0
007 cr nn 008mamaa
008 171206s2017 sz | s |||| 0|eng d
020 _a9783319723891
_9978-3-319-72389-1
024 7 _a10.1007/978-3-319-72389-1
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aSecurity, Privacy, and Anonymity in Computation, Communication, and Storage
_h[electronic resource] :
_b10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedings /
_cedited by Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo.
250 _a1st ed. 2017.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2017.
300 _aXVIII, 610 p. 200 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v10656
505 0 _aOptimized Analysis Based on Improved Mutation and Crossover Operator for Differential Evolution Algorithm -- Revisiting Localization Attacks in Mobile App People-Nearby Services -- Lengthening Unidimensional Continuous-variable Quantum Key Distribution with Noiseless Linear Amplifier -- Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext -- An Attack to an Anonymous Certi cateless Group Key Agreement Scheme and its Improvement -- A Space Effcient Algorithm for LCIS Problem -- Improving the Efficiency of Dynamic Programming in Big Data Computing -- Traceable and Complete Fine-Grained Revocable Multi-Authority Attribute-Based Encryption Scheme in Social Network -- The All Seeing Eye: Web to App Intercommunication for Session Fingerprinting in Android -- An Efficient Hierarchical Identity-Based Encryption Scheme for the Key Escrow -- An Improved Pre-Copy Transmission Algorithm in Mobile Cloud Computing -- Motivation of DDOS Attack-Aware Link Assignment between Switches to SDN Controllers -- TIM: A Trust Insurance Mechanism for Network Function Virtualization Based on Trusted Computing -- Personalized Semantic Location Privacy Preservation Algorithm Based on Query Processing Cost Optimization -- Smartphone Bloatware: An Overlooked Privacy Problem -- An ECC-Based off-line Anonymous Grouping-proof Protocol -- PCSD: A Tool for Android Malware Detection -- Authorship Analysis of Social Media Contents Using Tone and Personality Features -- Privacy-Preserving Handover Authentication Protocol from Lightweight Identity-Based Signature for Wireless Networks -- Spatial Outlier Information Hiding Algorithm Based on Complex Transformation -- A Reputation Model Considering Repurchase Behavior and Mechanism Design to Promote Repurchase -- Chinese Named Entity Recognition Based on B-LSTM Neural Network with Additional Features -- Amplified Locality-Sensitive Hashing for Privacypreserving Distributed Service Recommendation -- Learn to Accelerate Identifying New TestCases in Fuzzing -- Service Selection Based on User Privacy Risk Evaluation -- An Efficient Lattice-Based Proxy Signature with Message Recovery -- FABAC: A Flexible Fuzzy Attribute-Based Access Control Mechanism -- Security Analysis and Improvement of An Anonymous Attribute-Based Proxy Re-encryption -- Relacha: Using Associative Meaning for Image Captcha Understandability -- Identification of Natural Images and Computer Generated Graphics Based on Multiple LBPs in Multicolor Spaces -- A Formal Android Permission Model Based on the B Method -- S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks -- MCloud: Efficient Monitoring Framework for Cloud Computing Platforms -- Secure Vibration Control of Flexible Arms based on Operators' Behaviors -- A New Color Image Encryption Scheme Based on Chaotic Hénon Map and Lü System -- A Distributed Authentication Protocol using Identity-based Encryption and Blockchain for LEO Network -- A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation -- A Unified Model for Detecting Privacy Leakage on Android -- Multi-party Security Computation with Differential Privacy Over Outsourced Data -- REW-SMT: A New Approach for Rewriting XACML Request with Dynamic Big Data Security Policies -- Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine Introspection -- Privacy Preserving Hierarchical Clustering over Multi-Party Data Distribution -- Improving MQTT by Inclusion of Usage Control -- Using JSON to Specify Privacy Preserving-enabled Attribute-based Access Control Policies -- Comprehensive Diversity in Recommender Systems -- Towards Intelligent System Wide Information Management for Air Traffic Management -- A Security Risk Management Model for Cloud Computing Systems: Infrastructure As A Service. .
520 _aThis book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy and Anonymity in Computation, Communication, and Storage, SpaCCS 2017, held in Guangzhou, China, in December 2017. The 47 papers presented in this volume were carefully reviewed and selected from 140 submissions. They deal with research findings, achievements, innovations and perspectives in information security and related fields covering topics such as security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.
650 0 _aData protection.
_97245
650 0 _aComputer networks .
_931572
650 0 _aComputer engineering.
_910164
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aArtificial intelligence.
_93407
650 1 4 _aData and Information Security.
_931990
650 2 4 _aComputer Communication Networks.
_9113732
650 2 4 _aComputer Engineering and Networks.
_9113733
650 2 4 _aCryptology.
_931769
650 2 4 _aArtificial Intelligence.
_93407
700 1 _aWang, Guojun.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9113734
700 1 _aAtiquzzaman, Mohammed.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9113735
700 1 _aYan, Zheng.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9113736
700 1 _aChoo, Kim-Kwang Raymond.
_eeditor.
_0(orcid)
_10000-0001-9208-5336
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9113737
710 2 _aSpringerLink (Online service)
_9113738
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319723884
776 0 8 _iPrinted edition:
_z9783319723907
830 0 _aInformation Systems and Applications, incl. Internet/Web, and HCI,
_x2946-1642 ;
_v10656
_9113739
856 4 0 _uhttps://doi.org/10.1007/978-3-319-72389-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c89584
_d89584