چو ایران نباشد تن من مباد
Security and Privacy in New Computing Environments: Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings ... and Telecommunications Engineering)

دانلود کتاب Security and Privacy in New Computing Environments: Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings ... and Telecommunications Engineering)

53000 تومان موجود

کتاب امنیت و حریم خصوصی در محیط های محاسباتی جدید: سومین کنفرانس بین المللی EAI، SPNCE 2020، لینگبی، دانمارک، 6-7 آگوست 2020، مجموعه مقالات ... و مهندسی مخابرات) نسخه زبان اصلی

دانلود کتاب امنیت و حریم خصوصی در محیط های محاسباتی جدید: سومین کنفرانس بین المللی EAI، SPNCE 2020، لینگبی، دانمارک، 6-7 آگوست 2020، مجموعه مقالات ... و مهندسی مخابرات) بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 7


توضیحاتی در مورد کتاب Security and Privacy in New Computing Environments: Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings ... and Telecommunications Engineering)

نام کتاب : Security and Privacy in New Computing Environments: Third EAI International Conference, SPNCE 2020, Lyngby, Denmark, August 6-7, 2020, Proceedings ... and Telecommunications Engineering)
عنوان ترجمه شده به فارسی : امنیت و حریم خصوصی در محیط های محاسباتی جدید: سومین کنفرانس بین المللی EAI، SPNCE 2020، لینگبی، دانمارک، 6-7 آگوست 2020، مجموعه مقالات ... و مهندسی مخابرات)
سری :
نویسندگان : , ,
ناشر : Springer
سال نشر : 2021
تعداد صفحات : 465
ISBN (شابک) : 3030669211 , 9783030669218
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 33 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Preface
Conference Organization
Contents
Network Security
A Characterisation of Smart Grid DoS Attacks
1 Introduction
2 Smart Grids Background
2.1 Smart Grid Domains
2.2 Smart Grid Structure
2.3 Smart Grid Components
3 Smart Grid DoS Survey
4 Smart Grid Denial-of-Service Characterisation
4.1 Network Saturation Scenarios (A.1)
4.2 Network Exploit Scenarios (A.2)
4.3 Device Exhaustion Scenarios (B.1)
4.4 Device Compromise Scenarios (B.2)
5 Discussion
6 Related Work
7 Conclusions
References
Security and Privacy in 5G Applications: Challenges and Solutions
1 Introduction
2 Usage Scenarios and Applications of 5G
2.1 5G Enabled Smart Manufacturing
2.2 5G Enabled Smart Traffic
2.3 5G Enabled Smart Grids
2.4 5G Enabled Smart Campus
3 Security and Privacy Issues in 5G Applications
3.1 eMBB Scenario
3.2 uRLLC Scenario
3.3 mMTC Scenario
4 Security and Privacy Solutions in a Systematic View
4.1 Reference Architecture of 5G Application Systems
4.2 Solutions on Terminal Layer
4.3 Solutions on Network Layer
4.4 Solutions on Platform Layer
4.5 Solutions on Service Layer
5 Countermeasures Against Security and Privacy Risks in 5G Applications
5.1 eMBB Scenario
5.2 uRLLC Scenario
5.3 mMTC Scenario
6 Conclusions
References
Alarm Elements Based Adaptive Network Security Situation Prediction Model
1 Introduction
2 Network Security Situation Prediction Model
3 Quantification of Network Security Situation Assessment
4 Network Security Situation Prediction Sub-module
4.1 Sliding Window Mechanism
4.2 Adaptive Cubic Exponential Smoothing Model
5 Predictive Value Correction Sub-module
5.1 Error State Division
5.2 Time-Varying Weighted Markov Chain Based on Error State
5.3 Threshold Test
6 Experimental Results and Analysis
6.1 Experimental Data Processing
6.2 Experimental Comparison and Analysis
7 Conclusion
References
Watermark Based Tor Cross-Domain Tracking System for Tor Network Traceback
1 Introduction
2 Related Work
3 Watermark Based Tor Cross-Domain Tracking System
4 Design of Digital Watermark Model
4.1 Inter Packet Delay Based Watermark Design
4.2 Interval Based Watermark Design
4.3 Interval Gravity Based Watermark Design
5 Experimental Results
5.1 Experiment Design
5.2 Results Analysis of IPD Model
5.3 Results Analysis of IW Model
5.4 Results Analysis of IWG Model
5.5 Results Analysis
6 Conclusion
References
System Security
Research on IoT Security Technology and Standardization in the 5G Era
1 Introduction
1.1 5G Accelerates the Development of IoT
1.2 Security Risks for IoT in the 5G Era
2 IoT Security Policies and Standards in the 5G Era
2.1 Security Policies
2.2 Security Standards
3 Security Requirements and Measures of IoT
3.1 Sensing Devices and Cards
3.2 Network and Transmission Exchange
3.3 Business Application and Service
3.4 Security Management and Operation
4 Suggestions on the Development of IoT in the 5G Era
4.1 Sensing Devices and Cards
4.2 Network and Transmission Exchange
4.3 Business Application and Service
4.4 Security Management and Operation
5 Conclusion
References
MIMEC Based Information System Security Situation Assessment Model
1 Introduction
2 Security Situation Assessment Model
3 Multi-source Data Standardization
3.1 Standardization of Qualitative Indicators
3.2 Standardization of Quantitative Indicators
4 Interval Matrix Correction Module
4.1 Interval Matrix Consistency Degree Judgment Sub-module
4.2 Interval Matrix Element Adjustment Sub-module
4.3 The Best Deterministic Matrix Acquisition Sub-module
5 Entropy Weight Based Cloud Module
5.1 Expert Evaluation of Membership Cloud
5.2 Membership Cloud Gravity Center
6 Experiment and Analysis
7 Conclusion
References
IoTFC: A Secure and Privacy Preserving Architecture for Smart Buildings
1 Introduction
2 Use Cases
3 Communication Technologies
3.1 Available IoT Smart Building Systems
3.2 Networking Standards/technologies for Smart Buildings
4 System Architecture
4.1 Entities
4.2 Functionality of Layers
4.3 Security and Privacy Solutions
5 Comparative Analysis
6 Conclusions
References
A Secure Experimentation Sandbox for the Design and Execution of Trusted and Secure Analytics in the Aviation Domain
1 Introduction
2 Materials and Methods
2.1 The ICARUS Technical Solution
2.2 The ICARUS Secure Experimentation Sandbox
3 Results
3.1 Extra-Aviation Services in an Integrated Airport Environment
3.2 Routes Analysis for Fuel Consumption Optimization and Pollution Awareness
3.3 Aviation-Related Disease Spreading
3.4 Enhancing Passenger Experience with ICARUS Data
4 Conclusions
References
Machine Learning
Research on a Hybrid EMD-SVR Model for Time Series Prediction
1 Introduction
2 Methodology
2.1 Theory of Empirical Mode Decomposition (EMD)
2.2 Theory of Support Vector Regression (SVR)
2.3 EMD-SVR Method for Time Series Analysis
3 Experiments and Results
3.1 The EMD-SVR Forecasting Model of Non-stationary Time Series for Building Energy Consumption
3.2 Comparison of Noise-Resistant Capabilities for SVR and EMD-SVR
4 Conclusion
References
Distant Supervision for Relations Extraction via Deep Residual Learning and Multi-instance Attention in Cybersecurity
1 Introduction
2 Related Work
3 The Proposed Model
3.1 Vector Representation
3.2 Deep Residual Neural Network
3.3 Multi-instance Attention
4 Performance Evaluation
4.1 Datasets
4.2 Results
5 Conclusions
References
User Identity Linkage Across Social Networks Based on Neural Tensor Network
1 Introduction
2 Preliminaries
2.1 Terminology Definition
2.2 Problem Definition
3 NUIL: The Proposed Model
3.1 Network Embedding Based on Random Walks and Skip-Gram
3.2 Modeling Relations Between Users Based on Neural Tensor Network
3.3 Matching Identities Based on Multi-Layer Perceptron
4 Experiments
4.1 Dataset, Baselines and Parameter Setup, and Evaluation Metrics
4.2 User Identity Linkage Performance
4.3 Discussions
5 Conclusion
References
An Efficient and Privacy-Preserving Physiological Case Classification Scheme for E-healthcare System
1 Introduction
2 System Model and Security Requirements
2.1 System Model
2.2 Security Requirements
3 Preliminaries
3.1 Bilinear Pairing
3.2 Support Vector Machine (SVM)
3.3 Okamoto-Uchiyama (OU) Homomorphic Cryptosystem
4 The Proposed EPPC Scheme
4.1 System Initialization
4.2 PU Physiological Case Generation
4.3 PU Physiological Case Normalization
4.4 Privacy-Preserving Physiological Case Classification
5 Security Analysis
6 Performance Evaluation
6.1 Security Comparison
6.2 Experimental Setup
6.3 Computational Cost
6.4 Communication Overhead
7 Conclusion
References
A Multi-class Detection System for Android Malicious Apps Based on Color Image Features
1 Introduction
2 Related Work
3 Prerequirement
3.1 Malicious App Behavior of Android
3.2 Android Malicious App Family
4 Our Approach
4.1 Select Features
4.2 Android App Color Visualization
4.3 Malware Detection
5 Experiments
5.1 Characterization of Gray and Color Images
5.2 Multi-classification of Color Images Using Different DL Models
5.3 Color Visualization Experiments with Different Features
6 Discussions and Limitations
7 Conclusion
References
Authentication and Access Control
PUF-Based Two-Factor Group Authentication in Smart Home
1 Introduction
1.1 Related Work
2 Preliminaries
2.1 Chinese Reminder Theorem ch14Zhang2019Chinese
2.2 Physical Unclonable Function ch14Wallrabenstein2016Practical
2.3 Fuzzy Extractor ch14Odelu2015Secure
3 Authentication Scheme Construction
3.1 Smart Device Registration Phase
3.2 User Registration Phase
3.3 Home Gateway Registration Phase
3.4 Login and Authentication Phase
3.5 Biometrics and Password Update Phase
4 Security Analysis
5 Performance Analysis
6 Conclusion
References
An Authentication Framework in ICN-Enabled Industrial Cyber-Physical Systems
1 Introduction
1.1 Related Work
2 Problem Statement
2.1 System Model
2.2 Threat Model
2.3 Objectives
3 Building Block: Proxy Signature
3.1 Construction
3.2 Comparison
4 Our Solutions
4.1 Overview
4.2 The Complete Authentication Scheme
5 Security Analysis
5.1 Security Properties Analysis
5.2 Comparison
6 Performance Analysis
7 Conclusion
References
Access Control for Wireless Body Area Networks
1 Introduction
2 Preliminaries
2.1 System Model
2.2 Design Goals
2.3 CP-ABE Scheme
2.4 Access Tree
3 The Proposed Concrete Scheme
3.1 System Initialization
3.2 Key Generation
3.3 Data Encryption
3.4 Data Re-encryption
3.5 Data Decryption
3.6 Attribute Update
4 Security Analysis
4.1 Resist Internal Attacks
4.2 Resist External Attacks
4.3 Collusion Resistance
5 Performance Evaluation
5.1 Comparative Analysis
5.2 Performance Evaluation
6 Conclusion
References
FIDO – That Dog Won\'t Hunt
1 Introduction
2 Starting Over
3 Introducing Client-Side Secure Hardware
3.1 Username/Password
4 FIDO
4.1 The Problem with PKI
4.2 So How Does FIDO Protect Public Keys? Spoiler – It Doesn\'t
4.3 Is FIDO Truly Two-Factor?
4.4 Is Secure Hardware Secure?
5 FIDO – Our Verdict
6 An Alternative Approach
6.1 Client Side, Look – No Hardware!
6.2 Server Side, Look – No Credential Database!
7 Conclusion
References
Blockchain-Enabled User Authentication in Zero Trust Internet of Things
1 Introduction
1.1 IoT Authentication
1.2 Blockchain
2 Blockchain-Enabled Device Mutual Authentication
2.1 Self-sovereign Security
2.2 Challenges
3 Proposed Device Authentication in zIoT
4 Evaluation
5 Conclusion
References
Cloud Security
Security Analysis and Improvement of a Dynamic-Hash-Table Based Auditing Scheme for Cloud Storage
1 Introduction
2 Review of DHT-PA
2.1 Setup Phase
2.2 Verification Phase
3 Cryptanalysis of Li et al.\'s Scheme
4 Possible Countermeasure
5 Conclusion
References
A Public Auditing Framework Against Malicious Auditors for Cloud Storage Based on Blockchain
1 Introduction
2 Related Works
3 Preliminaries
4 The Framework of Public Auditing Scheme Based on Blockchain
4.1 System Model
4.2 The Proposed Framework
5 The Detailed Scheme
6 Security Requirements Discussions
7 Experimental Analysis
8 Conclusion
References
A Secure and Verifiable Outsourcing Scheme for Machine Learning Data
1 Introduction
2 Related Work
3 Problem Description and Research Goals
3.1 Research Goals and Challenges
3.2 System Model
3.3 Linear Regression and Gradient Descent
3.4 System Framework
4 System Solutions
4.1 Encryption and Decryption Methods for Outsourced Data
4.2 Description of Scheme
5 System Analysis
5.1 Security
5.2 System Performance Analysis
6 Conclusion
References
Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration
1 Introduction
2 Related Works
3 Support Vector Machine Intrusion Detection Scheme Based on Cloud-Fog Collaboration
4 PCA and PSO-Optimized SVM for Intrusion Detection
4.1 PCA Data Dimensionality Reduction
4.2 SVM Algorithm
4.3 PCA and PSO-Optimized Support Vector Machine for Intrusion Detection
5 Experimental Evaluation
5.1 Data Preprocessing
5.2 Experimental Evaluation Index
5.3 Experimental Analysis
6 Conclusions
References
An Multi-feature Fusion Object Detection System for Mobile IoT Devices and Edge Computing
1 Introduction
2 Related Work
3 Approach
3.1 RetinaNet for Object Location
3.2 Fusion of SIFT Features and CNN Features to Classification
4 Experimental Results and Analysis
5 Conclusion and Future Work
References
Cryptography
Generative Image Steganography Based on Digital Cardan Grille
1 Introduction
2 Related Work
3 The Proposed Algorithm
3.1 Design Principles of Digital Cardan Grille
3.2 Automatic Generation of Digital Cardan Grille
3.3 Completion Stego Image
4 Experiment and Analysis
5 Conclusion and Future Work
References
Pixel Grouping Based Image Hashing for DIBR 3D Image
1 Introduction
2 Related Work
3 Review of Depth-Image-Based Rendering Process
4 Proposed Image Hashing
4.1 Pre-processing
4.2 Pixel Grouping
4.3 Hash Generation
5 Experimental Results
6 Conclusions
References
Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP
1 Introduction
1.1 Related Work
1.2 Our Contributions
1.3 Organization
2 Preliminaries
2.1 Description of KATAN
2.2 Conditional Differential Analysis
3 Improved Conditional Differential Cryptanalysis
3.1 Modeling the Difference Propagation of the Round Function
3.2 Detecting the Bias of the Difference
4 Application to KATAN32
4.1 Key-Recovery Attack on 79-Round KATAN32
4.2 Key-Recovery Attack on 81-Round KATAN32
5 Extension with the Standard Differential Attack
5.1 Key-Recovery Attack on 97-Round KATAN32
5.2 Key-Recovery Attack on 98-Round KATAN32
5.3 Key-Recovery Attack on 99-Round KATAN32
6 Conclusion
References
Applied Cryptography
A Verifiable Combinatorial Auction with Bidder\'s Privacy Protection
1 Introduction
2 Privacy Preserving Combinatorial Auction Model
2.1 System Model
2.2 Adversary Model
3 Our Proposed Scheme
3.1 Privacy-Preserving Winner Determination Model
3.2 Privacy-Preserving Verifiable Payment Determination Model
4 Security Analysis
5 Performance Analysis
6 Conclusion
References
A Multi-user Shared Searchable Encryption Scheme Supporting SQL Query
1 Introduction
1.1 Our Contributions
1.2 Related Work
2 Preliminaries
2.1 Notations
2.2 Adversary Model
2.3 Complexity Assumptions
2.4 Security Definition
3 SQL Database
3.1 SQL Database
3.2 Dictionary Creation
4 The Detailed Scheme
4.1 System Model
4.2 Multi-user Fine-Grained Access Control
4.3 Secure Key Transmission with Dual Encryption
5 Security Analysis
5.1 Confidentiality of Queries
5.2 Security of Secret Keys
6 Experimental Analysis
6.1 Experimental Environment
6.2 Query Security
6.3 Multi-user Keyword Query Performance
7 Conclusion and Future Work
References
Forward Secure Searchable Encryption with Conjunctive-Keyword Supporting Multi-user
1 Introduction
1.1 Our Contributions
1.2 Related Work
1.3 Organization
2 Problem Statement
2.1 System Model
2.2 Threat Model
2.3 Design Goals
3 Preliminaries
3.1 Bilinear Maps
3.2 Dynamic Symmetric Searchable Encryption
3.3 Security Definition
3.4 Result Pattern Leakage
3.5 Asymmetric Scalar-Product-Preserving Encryption ch29wong2009secure
4 Our Scheme
4.1 Construction
4.2 How to Deploy
5 Security Analysis
6 Efficiency Analysis and Performance Evaluation
6.1 Efficiency Comparison
6.2 Experiment Results
7 Conclusion
References
A3BAC: Attribute-Based Access Control Model with Anonymous Access
1 Introduction
2 Preliminary
2.1 ABAC Model
2.2 HABS Algorithm
3 A3BAC Framework
3.1 A3BAC Framework
3.2 Workflow of A3BAC
4 Analysis
5 Conclusion
References
Blockchain-Based Decentralized Privacy-Preserving Data Aggregation (BDPDA)
1 Introduction
2 Related Work
3 Preliminaries
4 System Model and Design Goals
5 The Proposed Scheme
6 Security Analysis
7 Performance Evaluation
8 Conclusion
References
Author Index




پست ها تصادفی