Security, privacy, and anonymity in computation, communication, and storage : SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, Proceedings / Guojun Wang, Bing Chen, Wei Li, Roberto Di Pietro, Xuefeng Yan, Hao Han (eds.).

This book constitutes seven refereed workshops and symposiums, SpaCCS Workshops 2020, which are held jointly with the 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2020, in Nanjing, China, in December 2020. The 48 papers were car...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpaCCS (Conference) Nanjing Shi, China)
Other Authors: Wang, Guojun (Computer scientist), Chen, Bing (Computer scientist), Li, Wei, Di Pietro, Roberto (Computer scientist), Yan, Xuefeng, Han, Hao
Format: eBook
Language:English
Published: Cham : Springer, 2021.
Series:Lecture notes in computer science ; 12383.
LNCS sublibrary. Information systems and applications, incl. Internet/Web, and HCI.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000 a 4500
001 on1237864045
003 OCoLC
005 20240623213015.0
006 m o d
007 cr un|---aucuu
008 210220s2021 sz o 101 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d GW5XE  |d SFB  |d GZM  |d DKU  |d OCLCF  |d OCLCO  |d OCLCQ  |d COM  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 1240630705  |a 1241066707 
020 |a 9783030688844  |q (electronic bk.) 
020 |a 3030688844  |q (electronic bk.) 
020 |z 9783030688837 
024 7 |a 10.1007/978-3-030-68884-4  |2 doi 
035 |a (OCoLC)1237864045  |z (OCoLC)1240630705  |z (OCoLC)1241066707 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
049 |a HCDD 
111 2 |a SpaCCS (Conference)  |n (13th :  |d 2020 :  |c Nanjing Shi, China) 
245 1 0 |a Security, privacy, and anonymity in computation, communication, and storage :  |b SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, Proceedings /  |c Guojun Wang, Bing Chen, Wei Li, Roberto Di Pietro, Xuefeng Yan, Hao Han (eds.). 
246 3 |a SpaCCS 2020 
260 |a Cham :  |b Springer,  |c 2021. 
300 |a 1 online resource (613 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
490 1 |a Lecture Notes in Computer Science ;  |v 12383 
490 1 |a LNCS sublibrary, SL 3, Information systems and applications, incl. internet/web, and HCI 
500 |a International conference proceedings. 
520 |a This book constitutes seven refereed workshops and symposiums, SpaCCS Workshops 2020, which are held jointly with the 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2020, in Nanjing, China, in December 2020. The 48 papers were carefully reviewed and selected from 131 submissions and cover a broad range of topics on security, privacy and anonymity in computation communication, and storage, including the 11th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2020), the 10th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2020), the 9th International Symposium on Security and Privacy on Internet of Things (SPIoT 2020), the 6th International Symposium on Sensor-Cloud Systems (SCS 2020), the Second International Workshop on Communication, Computing, Informatics and Security (CCIS 2020), the First International Workshop on Intelligence and Security in Next Generation Networks (ISNGN 2020), the First International Symposium on Emerging Information Security and Applications (EISA 2020). 
500 |a Includes author index. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed March 16, 2021). 
505 8 0 |g [I].  |t The 11th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2020):  |t EDC : an edge-oriented dynamic resource configuration strategy --  |t The future prospecgts of adversarial nets --  |t Secure cross-domain data sharing technology based on blockchain. 
505 8 0 |g [II].  |t The 10th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2020):  |t Microservice-oriented edge server deployment in cloud-edge system --  |t QoS-aware dynamical resource scheduling in cloud data centers --  |t BinSEAL : Linux binary obfuscation against synbolic execution --  |t Location based communication privacy in Internet of Vehicles using fog computing. 
505 8 0 |g [III].  |t The 9th International Symposium on Security and Privacy on Internet of Things (SPIoT 2020):  |t The theory and practice of magic hash based attacks on lightweight cryptographic hash functions in complex IoT environments --  |t Efficient public key cryptography scheme with equality test for heterogeneous systems in IIoT --  |t The dark (and bright) side of IoT : attacks and countermeasures for identifying smart home devices and services --  |t Study of transparent file encryption technology on Android platform --  |t SCPAC : an access control framework for diverse IoT platforms based on OAuth2.0. 
505 8 0 |g [IV].  |t The 6th International Symposium on Sensor-Cloud Systems (SCS 2020):  |t Adaptive routing strategy based on improved Q-learning for satellite Internet of Things --  |t Reliability evaluation of sensor network based on information entropy in power grid planning --  |t Intelligent fault diagnosis and response method based on GIS and IoT in power grid planning --  |t Group authentication for sensors in wireless body area network --  |t Automatic heart sound classification using one dimension deep neural network --  |t Indoor positioning technology based on the fusion of UWB and BLE --  |t A user privacy-preserving algorithm in the live streaming cloud platforms --  |t Multi-echelon vehicle routing problem in sensor-cloud architecture with mobile sinks --  |t Joint optimization of transmission source selection and RSU cache for vehicular video streaming --  |t Who distributes it? Privacy-preserving image sharing scheme with illegal distribution detection --  |t Stepwise-refined interval for deep learning to process sensor-cloud data with noises --  |t Data prediction service model based on sequential pattern mining in sensor-cloud --  |t Statisticval method of space distribution for riding base don R-tree uner differential privacy --  |t Multi-target tracking with EmbedMask and LSTM model fusion --  |t Face detction using improved multi-task cascaded convolutional networks --  |t Access control method absed on a mutual trust mechanism in the edgecomputing environment --  |t Increasing crop yield using agriculture sensing data in smart plant factory --  |t A fuzzy keywords enabled ranked searchable CP-ABE scheme for a public cloud environment --  |t Identifying traffic bottleneck in urban road networks via causal inference --  |t NAS-WFPN : neural architecture search weighted feature pyramid networks for object detection --  |t Performacne benchmarking and optimization for IIoT-oriented blockchain. 
505 8 0 |g [V].  |t The 2nd International Workshop on Communication, Computing, Informatics and Security (CCIS 2020):  |t A multi-patch deep learning system for text-independent writer identification --  |t Classification of abnormal traces in a collaborative fog computing architecture --  |t A multi-detection method of covert timing channel based on perceptual hashing --  |t Deep learning-based dew computing with novel offloading strategy --  |t Detecting credential stuffing between servers. 
505 8 0 |g [VI].  |t The 1st International Workshop on Intelligence and Security in Next Generation Networks (ISNGN 2020):  |t A critical node detection algorithm based node interplay model --  |t A posteriori preference multi-objective optimization using machine learning --  |t HVH : a lightweight hash function based on dual pseudorandom transformation --  |t SVHF : a lightweight stream cipher based on Feistel and OFB --  |t A novel quantum color image encryption scheme based on controlled alternate quantum walks. 
505 8 0 |g [VII].  |t The 1st International Symposium on Emerging Information Security and Applications (EISA 2020):  |t Security analysis of a multi-secret sharing scheme with unconditional security --  |t Simultaneous deauthentication of equals attack --  |t Impact of active scanning tools for device discovery in industrial networks --  |t Designing double-click-based unlocking mechanism on smartphones --  |t An efficient blind signature scheme with untraceability for data privacy in smart grid. 
650 0 |a Computer security  |v Congresses. 
650 0 |a Computer networks  |x Security measures  |v Congresses. 
650 0 |a Data protection  |v Congresses. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Data protection  |2 fast 
655 7 |a proceedings (reports)  |2 aat 
655 7 |a Conference papers and proceedings  |2 fast 
655 7 |a Conference papers and proceedings.  |2 lcgft 
655 7 |a Actes de congrès.  |2 rvmgf 
700 1 |a Wang, Guojun  |c (Computer scientist)  |1 https://id.oclc.org/worldcat/entity/E39PCjrRFxWRc9W9jF4k7d6xWC 
700 1 |a Chen, Bing  |c (Computer scientist)  |1 https://id.oclc.org/worldcat/entity/E39PCjqY74gYFc8HPp343HQKBP 
700 1 |a Li, Wei. 
700 1 |a Di Pietro, Roberto  |c (Computer scientist)  |1 https://id.oclc.org/worldcat/entity/E39PCjGTgMWY3vFyMdqTwFf76q 
700 1 |a Yan, Xuefeng. 
700 1 |a Han, Hao. 
758 |i has work:  |a Security, privacy, and anonymity in computation, communication, and storage (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCH83by6fF3CPfc9Y7vgtcd  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Wang, Guojun.  |t Security, Privacy, and Anonymity in Computation, Communication, and Storage.  |d Cham : Springer International Publishing AG, ©2021  |z 9783030688837 
830 0 |a Lecture notes in computer science ;  |v 12383. 
830 0 |a LNCS sublibrary.  |n SL 3,  |p Information systems and applications, incl. Internet/Web, and HCI. 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://link.springer.com/10.1007/978-3-030-68884-4  |y Click for online access 
903 |a SPRING-COMP2021 
994 |a 92  |b HCD