Trusted computing and information se...
Chinese Conference on Trusted Computing and Information Security (2019 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Trusted computing and information security = 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019 : revised selected papers /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Trusted computing and information security/ edited by Weili Han, Liehuang Zhu, Fei Yan.
    Reminder of title: 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24-27, 2019 : revised selected papers /
    remainder title: CTCIS 2019
    other author: Han, Weili.
    corporate name: Chinese Conference on Trusted Computing and Information Security
    Published: Singapore :Springer Singapore : : 2020.,
    Description: xii, 356 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Generative image Steganography based on GANs -- Partial blind proxy re-signature scheme for mobile internet -- Information Flow-Based Security Construction for Compositional Interface Automata -- Provably secure server-assisted verification threshold proxy re-signature scheme -- ReJection: A AST-based Reentrancy Vulnerability Detection Method -- Identity authentication under Internet of everything based on edge computing -- STC: Improving the Performance of Virtual Machines Based on Task Classification -- A Method for Realizing Covert Communication at Router Driving Layer -- A secure multi-party signature scheme based on trust mechanism -- Virtual FPGA Placement with An Efficient Ant Colony Optimization -- Identity-based threshold group signature scheme of Blockchain verification -- ByteDroid: Android Malware Detection using Deep Learning on Bytecode Sequences -- Research on Multidimensional System Security Assessment Based on AHP and Gray Correlation -- Research on Software Network Key Nodes Mining Methods Based on Complex Network -- Research and development of TPM virtualization -- A Secure Certificateless Identity Authentication Scheme Based on Blockchain -- A trust-based security research method for Internet of things terminal -- A QoS&SLA-driven Multifaceted Trust Model for Cloud Computing -- A Lossless Data hiding Scheme in Public Key Encrypted Domain based on homomorphic Key-Switching -- A Detection Approach for Buffer Overflow Vulnerability based on Data Control Flow Graph -- Outsourced Data Integrity Auditing for Efficient Batch Dynamic Updates -- Secure Personal Health Records Sharing based on Blockchain and IPFS.
    Contained By: Springer eBooks
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-981-15-3418-8
    ISBN: 9789811534188
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9391008 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 C55 2019 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login