Atnaujinkite slapukų nuostatas

El. knyga: Trusted Computing and Information Security: 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019, Revised Selected Papers

Edited by , Edited by , Edited by

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2019, held in Shanghai, China, in October 2019.

The 22 revised full papers presented were carefully reviewed and selected from 247 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, network security, information hiding. 

Generative image Steganography based on GANs.- Partial blind proxy
re-signature scheme for mobile internet.- Information Flow-Based Security
Construction for Compositional Interface Automata.- Provably secure
server-assisted verification threshold proxy re-signature scheme.- ReJection:
A AST-based Reentrancy Vulnerability Detection Method.- Identity
authentication under Internet of everything based on edge computing.- STC:
Improving the Performance of Virtual Machines Based on Task
Classification.- A Method for Realizing Covert Communication at Router
Driving Layer.- A secure multi-party signature scheme based on trust
mechanism.- Virtual FPGA Placement with An Efficient Ant Colony
Optimization.- Identity-based threshold group signature scheme of Blockchain
verification.- ByteDroid: Android Malware Detection using Deep Learning on
Bytecode Sequences.- Research on Multidimensional System Security Assessment
Based on AHP and Gray Correlation.- Research on Software Network Key Nodes
Mining Methods Based on Complex Network.- Research and development of TPM
virtualization.- A Secure Certificateless Identity Authentication Scheme
Based on Blockchain.- A trust-based security research method for Internet of
things terminal.- A QoS&SLA-driven Multifaceted Trust Model for Cloud
Computing.- A Lossless Data hiding Scheme in Public Key Encrypted Domain
based on homomorphic Key-Switching.- A Detection Approach for Buffer Overflow
Vulnerability based on Data Control Flow Graph.- Outsourced Data Integrity
Auditing for Ecient Batch Dynamic Updates.- Secure Personal Health Records
Sharing based on Blockchain and IPFS.