001450292 000__ 05071cam\a2200637\i\4500 001450292 001__ 1450292 001450292 003__ OCoLC 001450292 005__ 20230310004518.0 001450292 006__ m\\\\\o\\d\\\\\\\\ 001450292 007__ cr\cn\nnnunnun 001450292 008__ 221013s2022\\\\si\a\\\\o\\\\\101\0\eng\d 001450292 019__ $$a1347260380 001450292 020__ $$a9789811972423$$q(electronic bk.) 001450292 020__ $$a9811972427$$q(electronic bk.) 001450292 020__ $$z9789811972416 001450292 020__ $$z9811972419 001450292 0247_ $$a10.1007/978-981-19-7242-3$$2doi 001450292 035__ $$aSP(OCoLC)1347379813 001450292 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dEBLCP$$dOCLCF$$dOCLCQ 001450292 049__ $$aISEA 001450292 050_4 $$aTK5105.8855 001450292 08204 $$a025.042$$223/eng/20221013 001450292 1112_ $$aSocialSec (Conference)$$n(8th :$$d2022 :$$cXi'an, China). 001450292 24510 $$aSecurity and privacy in social networks and big data :$$b8th international symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, proceedings /$$cXiaofeng Chen, Xinyi Huang, Mirosław Kutyłowski (eds.). 001450292 24630 $$aSocialSec 2022 001450292 264_1 $$aSingapore :$$bSpringer,$$c[2022] 001450292 264_4 $$c©2022 001450292 300__ $$a1 online resource (xiii, 366 pages) :$$billustrations (chiefly color). 001450292 336__ $$atext$$btxt$$2rdacontent 001450292 337__ $$acomputer$$bc$$2rdamedia 001450292 338__ $$aonline resource$$bcr$$2rdacarrier 001450292 4901_ $$aCommunications in computer and information science,$$x1865-0937 ;$$v1663 001450292 500__ $$aInternational conference proceedings. 001450292 500__ $$aIncludes author index. 001450292 5050_ $$aCryptography and its applications -- Improved (t,n)-Threshold Proxy Signature Scheme -- Algorithm Substitution Attacks on Identity-Based Encryption -- Authenticated Continuous Top-k Spatial Keyword Search on Dynamic Objects -- Efficient Attribute-based Proxy Re-encryption for Secure Deduplication -- A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryption -- D2D Authentication Scheme for IoT-enabled Smart Home -- Inner Product Encryption from Middle-Product Learning with Errors -- Network security and privacy protection -- Publicly Verifiable Private Set Intersection from Homomorphic Encryption -- Secure Asynchronous Federated Learning for Edge Computing Devices -- FedBC: An Efficient and Privacy-preserving Federated Consensus Scheme -- A Secure and Privacy-preserving Authentication Scheme in IoMT -- Secure and Efficient k-Nearest Neighbor Query with Privacy-Preserving Authentication -- A Network Security Situation Assessment Method Based on Multi-attention Mechanism and HHO-ResNeXt -- A Privacy-Preserving Federated Learning with Mutual Verification on Vector Spaces -- Data detection -- Patch-based Backdoors Detection and Mitigation with Feature Masking -- Detection and Defense Against DDoS Attack on SDN Controller Based on Feature Selection -- Commodity-Tra: A Traceable Transaction Scheme Based on FISCO BCOS -- A Defect Heterogeneous Risk Assessment Method with Misclassification Cost -- Squeeze-Loss: A Utility-Free Defense Against Membership Inference Attacks -- Blockchain and its applications -- Improved WAVE Signature and Apply to Post-Quantum Blockchain -- Secure Government Data Sharing Based on Blockchain and Attribute-Based Encryption -- Secure Data Storage Scheme of Judicial System based on Blockchain -- Judicial Evidence Storage Scheme Based on Smart Contract. 001450292 506__ $$aAccess limited to authorized users. 001450292 520__ $$aThis book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022. The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of advancement of the field's foundations. They were organized in topical sections as follows: Cryptography and its applications; Network security and privacy protection; Data detection; Blockchain and its applications. 001450292 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed October 13, 2022). 001450292 650_0 $$aOnline social networks$$xSecurity measures$$vCongresses. 001450292 650_0 $$aData encryption (Computer science)$$vCongresses. 001450292 650_0 $$aBig data$$xSecurity measures$$vCongresses. 001450292 650_0 $$aPrivacy, Right of$$vCongresses. 001450292 655_0 $$aElectronic books. 001450292 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001450292 655_7 $$aConference papers and proceedings.$$2lcgft 001450292 7001_ $$aChen, Xiaofeng,$$d1976-$$eeditor. 001450292 7001_ $$aHuang, Xinyi$$c(Computer scientist),$$eeditor. 001450292 7001_ $$aKutyłowski, Mirosław,$$eeditor. 001450292 77608 $$iPrint version: $$z9811972419$$z9789811972416$$w(OCoLC)1345460182 001450292 830_0 $$aCommunications in computer and information science ;$$v1663.$$x1865-0937 001450292 852__ $$bebk 001450292 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-19-7242-3$$zOnline Access$$91397441.1 001450292 909CO $$ooai:library.usi.edu:1450292$$pGLOBAL_SET 001450292 980__ $$aBIB 001450292 980__ $$aEBOOK 001450292 982__ $$aEbook 001450292 983__ $$aOnline 001450292 994__ $$a92$$bISE