Atnaujinkite slapukų nuostatas

El. knyga: Security and Privacy in Social Networks and Big Data: 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings

Edited by , Edited by , Edited by

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022.

The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of advancement of the field’s foundations. They were organized in topical sections as follows: Cryptography and its applications; Network security and privacy protection; Data detection; Blockchain and its applications.
Cryptography and its applications.- Improved (t,n)-Threshold Proxy
Signature Scheme.- Algorithm Substitution Attacks on Identity-Based
Encryption.- Authenticated Continuous Top-k Spatial Keyword Search on Dynamic
Objects.- Efficient Attribute-based Proxy Re-encryption for Secure
Deduplication.- A Secure Word Vector Training Scheme Based on Inner-Product
Functional Encryption.- D2D Authentication Scheme for IoT-enabled Smart
Home.- Inner Product Encryption from Middle-Product Learning with
Errors.- Network security and privacy protection.- Publicly Verifiable
Private Set Intersection from Homomorphic Encryption.- Secure Asynchronous
Federated Learning for Edge Computing Devices.- FedBC: An Efficient and
Privacy-preserving Federated Consensus Scheme.- A Secure and
Privacy-preserving Authentication Scheme in IoMT.- Secure and Efficient
k-Nearest Neighbor Query with Privacy-Preserving Authentication.- A Network
Security Situation Assessment Method Based on Multi-attention Mechanism and
HHO-ResNeXt.- A Privacy-Preserving Federated Learning with Mutual
Verification on Vector Spaces.- Data detection.- Patch-based Backdoors
Detection and Mitigation with Feature Masking.- Detection and Defense Against
DDoS Attack on SDN Controller Based on Feature Selection.- Commodity-Tra: A
Traceable Transaction Scheme Based on FISCO BCOS.- A Defect Heterogeneous
Risk Assessment Method with Misclassification Cost.- Squeeze-Loss: A
Utility-Free Defense Against Membership Inference Attacks.- Blockchain and
its applications.- Improved WAVE Signature and Apply to Post-Quantum
Blockchain.- Secure Government Data Sharing Based on Blockchain and
Attribute-Based Encryption.- Secure Data Storage Scheme of Judicial System
based on Blockchain.- Judicial Evidence Storage Scheme Based on Smart
Contract.