000 | 05068nam a22007215i 4500 | ||
---|---|---|---|
001 | 978-3-030-29729-9 | ||
003 | DE-He213 | ||
005 | 20240730174946.0 | ||
007 | cr nn 008mamaa | ||
008 | 190813s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030297299 _9978-3-030-29729-9 |
||
024 | 7 |
_a10.1007/978-3-030-29729-9 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aApplied Cryptography and Network Security Workshops _h[electronic resource] : _bACNS 2019 Satellite Workshops, SiMLA, Cloud S&P, AIBlock, and AIoTS, Bogota, Colombia, June 5-7, 2019, Proceedings / _cedited by Jianying Zhou, Robert Deng, Zhou Li, Suryadipta Majumdar, Weizhi Meng, Lingyu Wang, Kehuan Zhang. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aXIV, 193 p. 41 illus., 28 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11605 |
|
505 | 0 | _aSiMLA - Security in Machine Learning and its Applications -- Risk-based Static Authentication in Web Applications with Behavioral Biometrics and Session Context Analytics -- Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks -- Cloud S&P - Cloud Security and Privacy -- Graphene: A Secure Cloud Communication Architecture -- A Survey on Machine Learning applications for Software Defined Network Security -- AIBlock - Application Intelligence and Blockchain Security -- A New Proof of Work for Blockchain Based on Random Multivariate Quadratic Equations -- BSIEM-IoT: A Blockchain-based and Distributed SIEM for the Internet of Things -- Towards Blockchained Challenge-based Collaborative Intrusion Detection -- AIoTS - Artificial Intelligence and Industrial Internet-of-Things Security -- Enhancement to the Privacy-aware Authentication for Wi-Fi based Indoor Positioning Systems -- Design of a FDIA Resilient Protection Scheme for Power Networks by Securing Minimal Sensor Set -- Strong Leakage Resilient Encryption by Hiding Partial Ciphertext. | |
520 | _aThis book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, in Bogota, Colombia, in June 2019. The 10 papers presented in this volume were carefully reviewed and selected from 30 submissions. They stem from the following workshops: AIBlock 2019: First International Workshop on Application Intelligence and Blockchain Security AIoTS 2019: First International Workshop on Articial Intelligence and Industrial Internet-of-Things Security Cloud S&P 2019: First International Workshop on Cloud Security and Privacy PriDA 2019: First InternationalWorkshop on Privacy-preserving Distributed Data Analysis SiMLA 2019: First International Workshop on Security in Machine Learning and its Applications. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aMachine learning. _91831 |
|
650 | 0 |
_aApplication software. _9114828 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Communication Networks. _9114829 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aMachine Learning. _91831 |
650 | 2 | 4 |
_aComputer and Information Systems Applications. _9114830 |
700 | 1 |
_aZhou, Jianying. _eeditor. _0(orcid) _10000-0003-0594-0432 _4edt _4http://id.loc.gov/vocabulary/relators/edt _9114831 |
|
700 | 1 |
_aDeng, Robert. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9114832 |
|
700 | 1 |
_aLi, Zhou. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9114833 |
|
700 | 1 |
_aMajumdar, Suryadipta. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9114834 |
|
700 | 1 |
_aMeng, Weizhi. _eeditor. _0(orcid) _10000-0003-4384-5786 _4edt _4http://id.loc.gov/vocabulary/relators/edt _9114835 |
|
700 | 1 |
_aWang, Lingyu. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9114836 |
|
700 | 1 |
_aZhang, Kehuan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9114837 |
|
710 | 2 |
_aSpringerLink (Online service) _9114838 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030297282 |
776 | 0 | 8 |
_iPrinted edition: _z9783030297305 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11605 _9114839 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-29729-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c89710 _d89710 |