Atnaujinkite slapukų nuostatas

El. knyga: Emerging Information Security and Applications: Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings

Edited by , Edited by , Edited by

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This volume constitutes selected papers presented at the Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022. Due to COVID-19, EISA 2022 was held fully online.

The 13 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice. 

Asymmetric Secure Multi-Party Signing Protocol for the Identity-Based
Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.- A
Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for
Vehicle Networks.- Towards Low-Latency Big Data Infrastructure at
Sangfor.- Differential Cryptanalysis of Lightweight Block Ciphers SLIM and
LCB.- Parallel Validity Analysis of the Boomerang Attack Model.- A Survey on
Discrete Gaussian Samplers in Lattice Based Cryptography.- Hierarchical
Identity Based Inner Product Functional Encryption for Privacy Preserving
Statistical Analysis without q-type assumption.- AutoRoC-DBSCAN: automatic
tuning of DBSCAN to detect malicious DNS tunnels.- HBMD-FL:Heterogeneous
Federated Learning Algorithm Based On Blockchain and Model
Distillation.- Secure and Efficient Certificateless Authentication Key
Agreement Protocol in VANET.- An Efficient Federated Convolutional Neural
Network Scheme with Differential Privacy.- D2CDIM:DID-based Decentralized
Cross-domain Identity Management with Privacy-Preservation and
Sybil-Resistance.- Link Aware Aggregation Query with Privacy-preserving
Capability in Wireless Sensor Networks.