Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security and privacy in communicatio...
~
International Conference on Security and Privacy for Emerging Areas in Communications Networks (2023 :)
Linked to FindBook
Google Book
Amazon
博客來
Security and privacy in communication networks = 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023 : proceedings.. Part I /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Security and privacy in communication networks/ edited by Haixin Duan ... [et al.].
Reminder of title:
19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023 : proceedings.
remainder title:
SecureComm 2023
other author:
Duan, Haixin.
corporate name:
International Conference on Security and Privacy for Emerging Areas in Communications Networks
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xvii, 535 p. :ill. (some col.), digital ;24 cm.
[NT 15003449]:
AI for Security -- Classify Me Correctly if You Can Evaluating Adversarial Machine Learning Threats in NIDS -- CUFT Cuflow based Approach with Multi headed Attention Mechanism for Encrypted Traffic Classification -- CyberEA An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph -- DNN Architecture Attacks via Network and Power Side Channels -- Invisibility Spell Adversarial Patch Attack Against Object Detectors -- Meta Perturbation Generation Network for Text based CAPTCHA -- Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks -- Unsupervised Multi Criteria Adversarial Detection in Deep Image Retrieval -- VRC GraphNet A Graph Neural Network based Reasoning Framework for Attacking Visual Reasoning Captchas -- Authentication -- An Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density -- Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home -- Optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller -- Blockchain and Distributed System Security -- Byzantine Protocols with Asymptotically Optimal Communication Complexity -- Demystifying Blockchain Scalability Sibling Chains with Minimal Interleaving -- VDABSys A novel security testing framework for blockchain systems based on vulnerability detection. Cryptography -- Anonymous Key Issuing Protocol with Certified Identities in Identity based Encryption -- Batch Lattice Based Designated Verifier ZK SNARKs for R1CS -- Certificateless Aggregate Signature Without Trapdoor for Cloud Storage -- Efficient Zero Knowledge for Regular Language -- Enabling Fast Settlement in Atomic Cross-Chain Swaps -- HeSUN Homomorphic Encryption for Secure Unbounded Neural Network Inference -- Optimization of Functional Bootstraps with Large LUT and Packing Key Switching -- Data Security -- An Authentication Algorithm for Sets of Spatial Data Objects -- An Efficient Private Information Retrieval Protocol Based on TFHE -- mShield Protect In-process Sensitive Data Against Vulnerable Third Party Libraries -- Password Cracking by Exploiting User Group Information.
Contained By:
Springer Nature eBook
Subject:
Telecommunication systems - Congresses. - Security measures -
Online resource:
https://doi.org/10.1007/978-3-031-64948-6
ISBN:
9783031649486
Security and privacy in communication networks = 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023 : proceedings.. Part I /
Security and privacy in communication networks
19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023 : proceedings.Part I /[electronic resource] :SecureComm 2023edited by Haixin Duan ... [et al.]. - Cham :Springer Nature Switzerland :2025. - xvii, 535 p. :ill. (some col.), digital ;24 cm. - Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,5671867-822X ;. - Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;567..
AI for Security -- Classify Me Correctly if You Can Evaluating Adversarial Machine Learning Threats in NIDS -- CUFT Cuflow based Approach with Multi headed Attention Mechanism for Encrypted Traffic Classification -- CyberEA An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph -- DNN Architecture Attacks via Network and Power Side Channels -- Invisibility Spell Adversarial Patch Attack Against Object Detectors -- Meta Perturbation Generation Network for Text based CAPTCHA -- Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks -- Unsupervised Multi Criteria Adversarial Detection in Deep Image Retrieval -- VRC GraphNet A Graph Neural Network based Reasoning Framework for Attacking Visual Reasoning Captchas -- Authentication -- An Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density -- Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home -- Optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller -- Blockchain and Distributed System Security -- Byzantine Protocols with Asymptotically Optimal Communication Complexity -- Demystifying Blockchain Scalability Sibling Chains with Minimal Interleaving -- VDABSys A novel security testing framework for blockchain systems based on vulnerability detection. Cryptography -- Anonymous Key Issuing Protocol with Certified Identities in Identity based Encryption -- Batch Lattice Based Designated Verifier ZK SNARKs for R1CS -- Certificateless Aggregate Signature Without Trapdoor for Cloud Storage -- Efficient Zero Knowledge for Regular Language -- Enabling Fast Settlement in Atomic Cross-Chain Swaps -- HeSUN Homomorphic Encryption for Secure Unbounded Neural Network Inference -- Optimization of Functional Bootstraps with Large LUT and Packing Key Switching -- Data Security -- An Authentication Algorithm for Sets of Spatial Data Objects -- An Efficient Private Information Retrieval Protocol Based on TFHE -- mShield Protect In-process Sensitive Data Against Vulnerable Third Party Libraries -- Password Cracking by Exploiting User Group Information.
This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China. The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows: Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security. Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security.
ISBN: 9783031649486
Standard No.: 10.1007/978-3-031-64948-6doiSubjects--Topical Terms:
893346
Telecommunication systems
--Security measures--Congresses.
LC Class. No.: TK5102.85
Dewey Class. No.: 005.8
Security and privacy in communication networks = 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023 : proceedings.. Part I /
LDR
:04095nmm a2200349 a 4500
001
2407701
003
DE-He213
005
20241012125736.0
006
m d
007
cr nn 008maaau
008
260204s2025 sz s 0 eng d
020
$a
9783031649486
$q
(electronic bk.)
020
$a
9783031649479
$q
(paper)
024
7
$a
10.1007/978-3-031-64948-6
$2
doi
035
$a
978-3-031-64948-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5102.85
072
7
$a
UTN
$2
bicssc
072
7
$a
COM043050
$2
bisacsh
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5102.85
$b
.I61 2023
111
2
$a
International Conference on Security and Privacy for Emerging Areas in Communications Networks
$n
(19th :
$d
2023 :
$c
Hong Kong, China)
$3
3779679
245
1 0
$a
Security and privacy in communication networks
$h
[electronic resource] :
$b
19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023 : proceedings.
$n
Part I /
$c
edited by Haixin Duan ... [et al.].
246
3
$a
SecureComm 2023
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xvii, 535 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
490
1
$a
Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
$x
1867-822X ;
$v
567
505
0
$a
AI for Security -- Classify Me Correctly if You Can Evaluating Adversarial Machine Learning Threats in NIDS -- CUFT Cuflow based Approach with Multi headed Attention Mechanism for Encrypted Traffic Classification -- CyberEA An Efficient Entity Alignment Framework for Cybersecurity Knowledge Graph -- DNN Architecture Attacks via Network and Power Side Channels -- Invisibility Spell Adversarial Patch Attack Against Object Detectors -- Meta Perturbation Generation Network for Text based CAPTCHA -- Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks -- Unsupervised Multi Criteria Adversarial Detection in Deep Image Retrieval -- VRC GraphNet A Graph Neural Network based Reasoning Framework for Attacking Visual Reasoning Captchas -- Authentication -- An Adaptive Authentication Protocol for Internet of Vehicles Based on Vehicle Density -- Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home -- Optimizing Lightweight Intermittent Message Authentication for Programmable Logic Controller -- Blockchain and Distributed System Security -- Byzantine Protocols with Asymptotically Optimal Communication Complexity -- Demystifying Blockchain Scalability Sibling Chains with Minimal Interleaving -- VDABSys A novel security testing framework for blockchain systems based on vulnerability detection. Cryptography -- Anonymous Key Issuing Protocol with Certified Identities in Identity based Encryption -- Batch Lattice Based Designated Verifier ZK SNARKs for R1CS -- Certificateless Aggregate Signature Without Trapdoor for Cloud Storage -- Efficient Zero Knowledge for Regular Language -- Enabling Fast Settlement in Atomic Cross-Chain Swaps -- HeSUN Homomorphic Encryption for Secure Unbounded Neural Network Inference -- Optimization of Functional Bootstraps with Large LUT and Packing Key Switching -- Data Security -- An Authentication Algorithm for Sets of Spatial Data Objects -- An Efficient Private Information Retrieval Protocol Based on TFHE -- mShield Protect In-process Sensitive Data Against Vulnerable Third Party Libraries -- Password Cracking by Exploiting User Group Information.
520
$a
This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China. The 52 papers were carefully reviewed and selected from 180 submissions. The papers presented in these two volumes are clustered into various thematical issues as follows: Part I: AI for Security; Authentication; Blockchain and Distributed System Security; Cryptography; Data Security. Part II: Intrusion and Anomaly Detection; IoT Security; Network Security; Privacy; Program Analysis; Software Security.
650
0
$a
Telecommunication systems
$x
Security measures
$v
Congresses.
$3
893346
650
0
$a
Computer networks
$x
Security measures
$x
Congresses.
$3
582085
650
1 4
$a
Mobile and Network Security.
$3
3382377
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Cryptology.
$3
3382308
650
2 4
$a
Security Services.
$3
3382346
650
2 4
$a
Computer and Information Systems Applications.
$3
3538505
700
1
$a
Duan, Haixin.
$3
3779680
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ;
$v
567.
$3
3779681
856
4 0
$u
https://doi.org/10.1007/978-3-031-64948-6
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9513199
電子資源
11.線上閱覽_V
電子書
EB TK5102.85
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login