001433828 000__ 08495cam\a2200757\a\4500 001433828 001__ 1433828 001433828 003__ OCoLC 001433828 005__ 20230309003655.0 001433828 006__ m\\\\\o\\d\\\\\\\\ 001433828 007__ cr\un\nnnunnun 001433828 008__ 210213s2021\\\\sz\\\\\\o\\\\\101\0\eng\d 001433828 019__ $$a1240626293$$a1241067005 001433828 020__ $$a9783030688516$$q(electronic bk.) 001433828 020__ $$a3030688518$$q(electronic bk.) 001433828 020__ $$z9783030688509 001433828 0247_ $$a10.1007/978-3-030-68851-6$$2doi 001433828 035__ $$aSP(OCoLC)1237401449 001433828 040__ $$aEBLCP$$beng$$epn$$cEBLCP$$dGW5XE$$dSFB$$dGZM$$dYDXIT$$dDKU$$dOCLCF$$dOCLCO$$dOCLCQ$$dCOM$$dOCLCO$$dOCLCQ 001433828 049__ $$aISEA 001433828 050_4 $$aQA76.9.A25 001433828 08204 $$a005.8$$223 001433828 1112_ $$aSpaCCS (Conference)$$n(13th :$$d2020 :$$cNanjing Shi, China) 001433828 24510 $$aSecurity, privacy, and anonymity in computation, communication, and storage :$$b13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, Proceedings /$$cGuojun Wang, Bing Chen, Wei Li, Roberto Di Pietro, Xuefeng Yan, Hao Han (eds.). 001433828 2463_ $$aSpaCCS 2020 001433828 260__ $$aCham :$$bSpringer,$$c2021. 001433828 300__ $$a1 online resource (436 pages) 001433828 336__ $$atext$$btxt$$2rdacontent 001433828 337__ $$acomputer$$bc$$2rdamedia 001433828 338__ $$aonline resource$$bcr$$2rdacarrier 001433828 347__ $$atext file 001433828 347__ $$bPDF 001433828 4901_ $$aLecture Notes in Computer Science ;$$v12382 001433828 4901_ $$aLNCS sublibrary, SL 3, Information systems and applications, incl. internet/web, and HCI 001433828 500__ $$aInternational conference proceedings. 001433828 500__ $$aIncludes author index. 001433828 50580 $$tPrivacy-preserving and scalable data access control based on self-sovereign identity management in large-scale cloud storage /$$rMin Xiao, Zhongyue Ma, Tao Li --$$tAttention mechanism based adversarial attack against deep reinforcement learning /$$rJinyin Chen, Xueke Wang, Yan Zhang, Haibin Zheng, Shouling Ji --$$tAttribute-based searchable encryption scheme with fuzzy keywords /$$rXinyu Song, Zhan Zhou, Weijie Duan, Zhongyi Liu, Chungen Xu --$$tImproving deep neural network robustness with Siamese empowered adversarial training /$$rYu Zhu, Zongfei Li, Fengyuan Xu, Sheng Zhong --$$tPredicting advanced persistent threats for IoT systems based on federated learning /$$rZitong Li, Xiang Cheng, Jiale Zhang, Bing Chen --$$tDFspliter : data flow oriented program partitioning against data stitching attacks /$$rChenyu Zhao, Hao Han --$$tRevisiting attacks and defenses in connected and autonomous vehicles /$$rZiyan Fang, Weijun Zhang, Zongfei Li, Huaao Tang, Hao Han, Fengyuan Xu --$$tAn improved cryptanalysis algorithm for Chebyshev map-based discrete logarithm problem /$$rWei Peng, Shang Song, Wenzheng Liu --$$tReinforcement-learning based network intrusion detection with human interaction in the loop /$$rZe Liu --$$tResearch on security of access control for cloud computing environment /$$rZhongdong Cui, Feng Yu 001433828 50580 $$tResearch and development of privacy protection of WSN routing protocol /$$rPanfei Liu, Feng Xu, Ying Zhu --$$tApply quantum search to the safety check for mono operational attribute based protection systems /$$rVincent C. Hu --$$tA semi-supervised intrusion detection algorithm based on auto-encoder /$$rXiangtong Du, Yongzhong Li, Zunlei Feng --$$tResarch on arm TrustZone and understanding the security vulnerability in its cache architecture /$$rPengfei Guo, Yingjian Yan, Chunsheng Zhu, Junjie Wang --$$tScrutinizing trust and transparency in cash on delivery systems /$$rXuan Son Ha, Trieu Hai Le, Tan Tai Phan, Hung Huy Duc Nguyen, Hong Khanh Vo, Nghia Duong-Trung --$$tExpansion adaption of attack-aware controller-link-switch cost minimization placement in software-defined networking /$$rCheng Chi Qin, Tan Saw Chin, Lee Ching Kwang, Zulfadzli Yusoff, Rizaluddin Kaspin --$$tA weighted federated averaging framework to reduce the negative influence from the dishonest users /$$rFengpan Zhao, Yan Huang, Saide Zhu, Venkata Malladi, Yubao Wu --$$tI can think like you! Towards reaction spoofing attack on brainwave-based authentication /$$rWei-Yang Chiu, Weizhi Meng, Wenjuan Li --$$tCubic permutation polynomials-based block RLNC algorithm in wireless networks /$$rHongwei Luo, Wanyi Feng, Baolin Sun, Ying Song --$$tA lightweight blockchain-based trust model for smart vehicles in VANETs /$$rSeyedvalyallah Ayobi, Yongli Wang, Mahdi Rabbani, Ali Dorri, Hamed Jelodar, Hucheng Huang et al. 001433828 50580 $$tLight intensity based IoT device positioning for indoor monitoring /$$rGaofei Sun, Xiaoshuang Xing, Zhenjiang Qian, Zhiguo Wang, Saide Zhu --$$tA blockchain-based reconstruction framework for UAV network /$$rGongzhe Qiao, Yi Zhuang --$$tA new certificateless aggregate signature scheme for wireless sensor networks /$$rYihong Wen, Yi Yang, Shicheng Wang, Li Li, Min Luo --$$tBlockchain and IoT based textile manufacturing traceability system in Industry 4.0 /$$rMuhammad Shakeel Faridi, Saqib Ali Guihua Duan, Guojun Wang --$$tA network security situational awareness framework based on situation fusion /$$rSai Lu, Yi Zhuang --$$tIntelligent medical security framework of body area network based on fog computing /$$rSongpeng Zhang, Yi Zhuang, Zining Cao --$$tSecure and traceable attribute-based sequential aggregate signature /$$rRuili Yang, Jiageng Chen, Shangle Li --$$tSocial spammer detection based on PSO-CatBoost /$$rShupeng Li, F. Jiang, Yunbai Qin, Kunkun Zheng --$$tSoftware developer recommendation in terms of reducing bug tossing length /$$rMuhammad Zubair Baloch, Shahid Hussain, Humaira Afzal, Muhammad Rafiq --$$tA methodology to automate the security patterns selection /$$rKhudema Zahra, Shahid Hussain, Humaira Afzal, Muhammad Rafiq Mufti, Dost Muhammad Khan, Muhammad Khalid Sohail. 001433828 506__ $$aAccess limited to authorized users. 001433828 520__ $$aThis book constitutes the refereed proceedings of the 13th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2020, held in Nanjing, China, in December 2020. The 30 full papers were carefully reviewed and selected from 88 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage. SpaCCS 2020 is held jointly with the 11th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2020), the 10th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2020), the 9th International Symposium on Security and Privacy on Internet of Things (SPIoT 2020), the 6th International Symposium on Sensor-Cloud Systems (SCS 2020), the 2nd International Workshop on Communication, Computing, Informatics and Security (CCIS 2020), the First International Workshop on Intelligence and Security in Next Generation Networks (ISNGN 2020), the First International Symposium on Emerging Information Security and Applications (EISA 2020). 001433828 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed March 16, 2021). 001433828 650_0 $$aComputer security$$vCongresses. 001433828 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001433828 650_0 $$aData protection$$vCongresses. 001433828 650_6 $$aSécurité informatique$$vCongrès. 001433828 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures$$vCongrès. 001433828 650_6 $$aProtection de l'information (Informatique)$$vCongrès. 001433828 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001433828 655_7 $$aConference papers and proceedings.$$2lcgft 001433828 655_7 $$aActes de congrès.$$2rvmgf 001433828 655_0 $$aElectronic books. 001433828 7001_ $$aWang, Guojun. 001433828 7001_ $$aChen, Bing. 001433828 7001_ $$aLi, Wei. 001433828 7001_ $$aDi Pietro, Roberto. 001433828 7001_ $$aYan, Xuefeng. 001433828 7001_ $$aHan, Hao. 001433828 77608 $$iPrint version:$$aWang, Guojun.$$tSecurity, Privacy, and Anonymity in Computation, Communication, and Storage.$$dCham : Springer International Publishing AG, ©2021$$z9783030688509 001433828 830_0 $$aLecture notes in computer science ;$$v12382. 001433828 830_0 $$aLNCS sublibrary.$$nSL 3,$$pInformation systems and applications, incl. Internet/Web, and HCI. 001433828 852__ $$bebk 001433828 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-68851-6$$zOnline Access$$91397441.1 001433828 909CO $$ooai:library.usi.edu:1433828$$pGLOBAL_SET 001433828 980__ $$aBIB 001433828 980__ $$aEBOOK 001433828 982__ $$aEbook 001433828 983__ $$aOnline 001433828 994__ $$a92$$bISE