this book constitutes the proceedings of the satellite workshops held around the 21st International conference on Applied Cryptography and Network security, ACNS 2023, held in Kyoto, Japan, in June 2023.;· ...
详细信息
ISBN:
(数字)9783031411816
ISBN:
(纸本)9783031411809
this book constitutes the proceedings of the satellite workshops held around the 21st International conference on Applied Cryptography and Network security, ACNS 2023, held in Kyoto, Japan, in June 2023.;· 1st ACNS Workshop on Automated Methods and data-driven Techniques in Symmetric-key Cryptanalysis (ADSC 2023);· 5th ACNS Workshop on application Intelligence and Blockchain security (AIBlock 2023);· 4th ACNS Workshop on Artificial Intelligence in Hardware security (AIHWS 2023);· 5th ACNS Workshop on Artificial Intelligence and Industrial IoT security (AIoTS 2023);· 3rd ACNS Workshop on Critical Infrastructure and Manufacturing System security (CIMSS 2023);· 5th ACNS Workshop on Cloud security and privacy (Cloud S&P 2023);· 4th ACNS Workshop on Secure Cryptographic Implementation (SCI 2023);· 4th ACNS Workshop on security in Mobile Technologies (SecMT 2023);· 5th ACNS Workshop on security in Machine Learning and its applications (SiMLA 2023)
this book constitutes the refereed proceedings of the 5th International conference on Future Network Systems and security, FNSS 2019, held in Melbourne, Australia, in November 2019.;the 16 full papers and two short pa...
详细信息
ISBN:
(数字)9783030343538
ISBN:
(纸本)9783030343521
this book constitutes the refereed proceedings of the 5th International conference on Future Network Systems and security, FNSS 2019, held in Melbourne, Australia, in November 2019.;the 16 full papers and two short papers presented were carefully reviewed and selected from 38 submissions. the papers are organized in topical sections onemerging networks and applications; security, privacy and trust; and security analytics and forensics
this book constitutes the refereed proceedings of the 14th Asia-Pacific conference APWeb 2012 held in Kunming, China, in April 2012. the 39 full papers presented together with 34 short papers, 2 keynote talks, and 5 d...
详细信息
ISBN:
(数字)9783642292538
ISBN:
(纸本)9783642292521
this book constitutes the refereed proceedings of the 14th Asia-Pacific conference APWeb 2012 held in Kunming, China, in April 2012. the 39 full papers presented together with 34 short papers, 2 keynote talks, and 5 demo papers were carefully reviewed and selected from 167 initial submissions. the papers cover contemporary topics in the fields of Web management and World Wide Web related research and applications, such as advanced application of databases, cloud computing, content management, data mining and knowledge discovery, distributed and parallel processing, grid computing, internet of things, semantic Web and Web ontology, security, privacy and trust, sensor networks, service-oriented computing, Web community analysis, Web mining and social networks.
this book constitutes the refereed proceedings of the 5th International conference on Dependability in Sensor, Cloud, and Big data Systems and applications, DependSys, held in Guangzhou, China, in November 2019.;...
详细信息
ISBN:
(数字)9789811513046
ISBN:
(纸本)9789811513039
this book constitutes the refereed proceedings of the 5th International conference on Dependability in Sensor, Cloud, and Big data Systems and applications, DependSys, held in Guangzhou, China, in November 2019.;the volume presents 39 full papers, which were carefully reviewed and selected from 112 submissions. the papers are organized in topical sections on dependability and security fundamentals and technologies; dependable and secure systems; dependable and secure applications; dependability and security measures and assessments; explainable artificial inteligence for cyberspace.
this book constitutes the proceedings of the 5th International conference, ICC3 2021, held in Coimbatore, India, during December 16–18, 2021.;the 14 full papers included in this book were carefully reviewed and selec...
详细信息
ISBN:
(数字)9783031155567
ISBN:
(纸本)9783031155550
this book constitutes the proceedings of the 5th International conference, ICC3 2021, held in Coimbatore, India, during December 16–18, 2021.;the 14 full papers included in this book were carefully reviewed and selected from 84 submissions. they were organized in topical sections as follows: computational intelligence; cyber security; and computational models.
this book constitutes the thoroughly refereed post-workshop proceedings of the Second International Workshop on privacy, security, and Trust in KDD, PinKDD 2008, held in Las Vegas, NV, USA, in March 2008 in conjunctio...
详细信息
ISBN:
(数字)9783642017186
ISBN:
(纸本)9783642017179
this book constitutes the thoroughly refereed post-workshop proceedings of the Second International Workshop on privacy, security, and Trust in KDD, PinKDD 2008, held in Las Vegas, NV, USA, in March 2008 in conjunction withthe 14thacm SIGKDD International conference on Knowledge Discovery and data Mining, KDD 2008. the 5 revised full papers presented together with 1 invited keynote lecture and 2 invited panel sessions were carefully reviewed and selected from numerous submissions. the papers are extended versions of the workshop presentations and incorporate reviewers' comments and discussions at the workshop and represent the diversity of data mining research issues in privacy, security, and trust as well as current work on privacy issues in geographic data mining.
this book constitutes the refereed proceedings of the 18th International conference on Web Engineering, ICWE 2018, held in Cáceres, Spain, in June 2018.;the 18 full research papers and 17 short papers p...
详细信息
ISBN:
(数字)9783319916620
ISBN:
(纸本)9783319916613
this book constitutes the refereed proceedings of the 18th International conference on Web Engineering, ICWE 2018, held in Cáceres, Spain, in June 2018.;the 18 full research papers and 17 short papers presented together with 2 practice papers, 6 demonstration papers, and 5 tutorials were carefully reviewed and selected from 103 submissions. the papers cover research areas such as Web application modeling and engineering; Web infrastructures and architectures; execution models; human computation and crowdsourcing applications; Web application composition and mashups; Social Web applications; Semantic Web applications; Web of things applications; big data and data analytics; and security, privacy, and identity.
the two-volume set CCIS 1896 and 1897 constitutes the refereed post-conferenceproceedings of the 5th International conference on Blockchain and Trustworthy Systems, BlockSys 2023, which took place in Haikou, China d...
详细信息
ISBN:
(数字)9789819981014
ISBN:
(纸本)9789819981007
the two-volume set CCIS 1896 and 1897 constitutes the refereed post-conferenceproceedings of the 5th International conference on Blockchain and Trustworthy Systems, BlockSys 2023, which took place in Haikou, China during August 8–10, 2023. the 45 revised full papers presented in these proceedings were carefully reviewed and selected from 93 submissions. the papers are organized in the following topical sections:;Part I: Anomaly detection on blockchain; edge intelligence and metaverse services; blockchain system security; empirical study and surveys; federated learning for blockchain.;Part II: AI for blockchain; blockchain applications; blockchain architecture and optimization; protocols and consensus.
this volume constitutes the refereed proceedings of the 5th IFIP WG 11.2 International Workshop on Information securitytheory and Practices: security and privacy of Mobile Devices in Wireless Communication, WISTP 201...
详细信息
ISBN:
(数字)9783642210402
ISBN:
(纸本)9783642210396
this volume constitutes the refereed proceedings of the 5th IFIP WG 11.2 International Workshop on Information securitytheory and Practices: security and privacy of Mobile Devices in Wireless Communication, WISTP 2011, held in Heraklion, Crete, Greece, in June 2011. the 19 revised full papers and 8 short papers presented together with a keynote speech were carefully reviewed and selected from 80 submissions. they are organized in topical sections on mobile authentication and access control, lightweight authentication, algorithms, hardware implementation, security and cryptography, security attacks and measures, security attacks, security and trust, and mobile applicationsecurity and privacy.
暂无评论