Security and Privacy in New Computing Environments: Third Eai International Conference, Spnce 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings » książka
Network Security.- A Characterisation of Smart Grid DoS Attacks.- Security and Privacy in 5G Applications: Challenges and Solutions.- Alarm Elements based Adaptive Network Security Situation Prediction Model.- Watermark based Tor Cross-domain Tracking System For Tor Network Traceback.- System Security.- Research on IoT Security Technology and Standardization in the 5G Era.- MIMEC Based Information System Security Situation Assessment Model.- IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings.- A Secure Experimentation Sandbox for the design and execution of trusted and secure analytics in the aviation domain.- Machine Learning.- Research on a Hybrid EMD-SVR Model for Time Series Prediction.- Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-Instance Attention in Cybersecurity.- User Identity Linkage across Social Networks based on Neural Tensor Network.- An Efficient and Privacy-Preserving Physiological Case Classification Scheme for E-healthcare System.- A multi-class detection system for Android malicious Apps based on color image features.- Authentication and Access Control.- PUF-based Two-factor Group Authentication in Smart Home.- An Authentication Framework in ICN-enabled Industrial Cyber-Physical Systems.- Access Control for Wireless Body Area Networks.- FIDO - that dog won’t hunt.- Blockchain-enabled user authentication in zero trust Internet of Things.- Cloud Security.- Security Analysis and Improvement of a Dynamic-Hash-Table based Auditing Scheme for Cloud Storage.- A Public Auditing Framework against Malicious Auditors for Cloud Storage based on Blockchain.- A Secure and Verifiable Outsourcing Scheme for Machine Learning Data.- Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration.- An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing.- Cryptography.- Generative image steganography based on digital Cardan Grille.- Pixel Grouping Based Image Hashing for DIBR 3D Image.- Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP.- Applied Cryptography.- A Verifiable Combinatorial Auction Scheme with Bidder’s Privacy Protection.- A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query.- Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-User.- A3BAC: Attribute-Based Access Control Model with Anonymous Access.- Blockchain-based Decentralized Privacy-Preserving Data Aggregation (BDPDA) Scheme for Smart Grid.