Science of cyber security - SciSec 2...
Su, Chunhua.

Linked to FindBook      Google Book      Amazon      博客來     
  • Science of cyber security - SciSec 2022 workshops = AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 10-12, 2022 : revised selected papers /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Science of cyber security - SciSec 2022 workshops/ edited by Chunhua Su, Kouichi Sakurai.
    Reminder of title: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 10-12, 2022 : revised selected papers /
    other author: Su, Chunhua.
    Published: Singapore :Springer Nature Singapore : : 2022.,
    Description: x, 227 p. :ill., digital ;24 cm.
    [NT 15003449]: AI Crypto and Security Workshop (AI-CryptoSec) -- Image Data Recoverability against Data Collaboration and its Countermeasure -- Image Data Recoverability against Data Collaboration and its Countermeasure -- Human Security Behavior Assistance in the Cyber-physical Space -- A Privacy-preserving Electricity Theft Detection (PETD) Scheme for Smart Grid -- Design and implementation of VCP network for Open Flow -- Theory and Application of Blockchain and NFT Workshop (TA-BC-NFT) -- Medical waste treatment process based on Blockchain technology - a case study of Covid-19 waste handling in Vietnam -- Blockchain technology-based management of blood and its products - a case study in Vietnam -- Application of the elimination competition mechanism based on blockchain multi-supervision in vehicle data sharing -- Economic Perspective of Cybersecurity: Principles and Strategies -- Towards a Dynamic Reputation Management Scheme for Cross-chain Transactions -- Mathematical Science of Quantum Safety and its Application Workshop (MathSci-Qsafe) -- Revisiting Security of Symmetric-Key Encryption with Imperfect Randomness and Correlation between Source and Keys -- A Secure Image-Video Retrieval Scheme with Attribute-Based Encryption and Multi-Feature Fusion in Smart Grid -- A Survey on Privacy Preserving Synthetic Data Generation and a Discussion on a Privacy-Utility Trade-off Problem -- Multi-Client Private Decision Tree Classification using Threshold Fully Homomorphic Encryption -- Advances in adversarial attacks and defenses in Intrusion Detection System: A survey -- Zero-touch Provisioned Device Lifecycle and Its Security in IoT -- Activation Code Delivery on V2X Pseudonym Certificate Revocation -- Federated Active Learning.
    Contained By: Springer Nature eBook
    Subject: Computer security - Congresses. -
    Online resource: https://doi.org/10.1007/978-981-19-7769-5
    ISBN: 9789811977695
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9447751 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 S25 2022 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login