Skip to content
Scan a barcode
Scan
Paperback Security and Privacy in New Computing Environments: 4th Eai International Conference, Spnce 2021, Virtual Event, December 10-11, 2021, Proceedings Book

ISBN: 3030967905

ISBN13: 9783030967901

Security and Privacy in New Computing Environments: 4th Eai International Conference, Spnce 2021, Virtual Event, December 10-11, 2021, Proceedings

Blockchain-based Outsourcing Shared Car Risk Prediction Scheme Design.- Fairness Protection Method of Vickery Auction Based on Smart Contract.- An Improved Needham-Schroeder Session Key Distribution Protocol For In-Vehicle CAN Network.- Research on Two-Party Cooperative Aigis-sig Digital Signature Protocol.- An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection.- A Lightweight PSIS Scheme Based on Multi-Node Collaboration in the IoT.- SAD: Website Fingerprint Defense based on Adversarial Examples.- A privacy-aware and time-limited data access control scheme with large universe and public traceability for Cloud-based IoD.- Multi-Party High-Dimensional Related Data Publishing via Probabilistic Principal Component Analysis and Differential Privacy.- ource code vulnerability detection method with multidimensional representation.- A Security Enhanced Verification Framework Based on Device Fingerprint in Internet of Things.- RLPassGAN: Password Guessing Model Based on GAN with Policy Gradient.- Linear Policy Recommender Scheme for Large-Scale Attribute-based Access Control.- Non-interactive Privacy-preserving Naive Bayes Classifier Using Homomorphic Encryption.- BA-Audit: blockchain-based public auditing for aggregated data sharing in edge-assisted IoT.- Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System.- Threat Detection-Oriented Network Security Situation Assessment Method.- System Business Affecting Impact Analysis Method with Crossover Probability Theory.- RAP: A Lightweight Application Layer Defense against Website Fingerprinting.- FL-iotDP: Differential Private Federated Neural Network.- Analysis of Vulnerability of IPsec Protocol Implementation Based on Differential Fuzzing.- Honeywords Generation Method Based on Deep Learning and Rule-based Password Attack.- Vulnerability Testing on the Key Scheduling Algorithm of PRESENT Using Deep Learning.- GLV/GLS Scalar Multiplication on Twisted Edwards Curves.- Online Privacy of Personal Information - Perceptions v Reality.- ARTPHIL: Reversible de-identification of free-text using an integrated model Bayan.- CAFM: Precise Classication for Android Family Malware.

Recommended

Format: Paperback

Condition: New

$99.99
50 Available
Ships within 2-3 days

Customer Reviews

0 rating
Copyright © 2026 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured