000857505 000__ 06577cam\a2200577Ii\4500 000857505 001__ 857505 000857505 005__ 20230306145204.0 000857505 006__ m\\\\\o\\d\\\\\\\\ 000857505 007__ cr\cn\nnnunnun 000857505 008__ 181218s2018\\\\sz\a\\\\o\\\\\101\0\eng\d 000857505 019__ $$a1082346267 000857505 020__ $$a9783030053451$$q(electronic book) 000857505 020__ $$a3030053458$$q(electronic book) 000857505 020__ $$z9783030053444 000857505 0247_ $$a10.1007/978-3-030-05345-1$$2doi 000857505 035__ $$aSP(OCoLC)on1079361772 000857505 035__ $$aSP(OCoLC)1079361772$$z(OCoLC)1082346267 000857505 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dUAB$$dDKU$$dOCLCF 000857505 049__ $$aISEA 000857505 050_4 $$aQA76.9.A25 000857505 08204 $$a005.8$$223 000857505 1112_ $$aSpaCCS (Conference)$$n(11th :$$d2018 :$$cMelbourne, N.S.W.) 000857505 24510 $$aSecurity, privacy, and anonymity in computation, communication, and storage :$$b11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings /$$cGuojun Wang, Jinjun Chen, Laurence T. Yang (eds.). 000857505 2463_ $$aSpaCCS 2018 000857505 264_1 $$aCham, Switzerland :$$bSpringer,$$c2018. 000857505 300__ $$a1 online resource (xv, 534 pages) :$$billustrations. 000857505 336__ $$atext$$btxt$$2rdacontent 000857505 337__ $$acomputer$$bc$$2rdamedia 000857505 338__ $$aonline resource$$bcr$$2rdacarrier 000857505 347__ $$atext file$$bPDF$$2rda 000857505 4901_ $$aLecture notes in computer science ;$$v11342 000857505 4901_ $$aLNCS sublibrary. SL 3, Information systems and applications, incl. Internet/Web, and HCI 000857505 500__ $$aInternational conference proceedings. 000857505 500__ $$aIncludes author index. 000857505 5050_ $$aProtecting Your Smartphone from Theft Using Accelerometer -- SOS -- Securing Open Skies DNS Traffic of a Tor Exit Node -- An Analysis -- SDN-Based Secure VANETs Communication with Fog Computing -- Wearable Device Data for Criminal Investigation -- Authentication of Skyline Query over Road Networks -- A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing -- Processing Analysis of Confidential Modes of Operation -- Matching Sensor Ontologies through Compact Evolutionary Tabu Search Algorithm -- Event-triggered Fault-detection Filter using Coordinate Transformation Approach for Time-varying Stochastic Systems -- Indoor Interference Classification Based on WiFi Channel State Information -- Secure and Privacy Preserving RFID Based Access Control to Smart Buildings -- Answering the Min-cost Quality-aware Query on Multi-sources in Sensor-Cloud Systems -- ^Balanced Iterative Reducing and Clustering Using Hierarchies with Principal Component Analysis (PBirch) for Intrusion Detection over Big Data in Mobile Cloud Environment -- A Four-stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Application of Sensor-Cloud Systems: Smart Traffic Control -- Strategy-Proof Mechanism for Provisioning Nonobedient Resources Without Payment -- Risk Identification-based Association Rule Mining for Supply Chain Big Data -- TrCMP: An App Usage Inference Method for Mobile Service Enhancement -- A High-performance Adaptive Strategy of Container Checkpoint Based on Pre-replication -- Cloud Enabled e-glossary System: A Smart Campus Perspective -- A Dynamic Integrity Transitivity Model for the Cloud -- Enhancing Dependability in Big Data Analytics Enterprise Pipelines -- Overview of Logistics Equilibrium Distribution Networks System: An Urban Perspective -- CRAB: Blockchain Based Criminal Record Management System -- ^Secure Passive Keyless Entry and Start System Using Machine Learning -- Towards New Privacy Regulations in Europe: Users' Privacy Perception in Recommender Systems -- SafeTECKS: Protect Data Safety in Things-Edge-Cloud Architecture with Knowledge Sharing -- NTRDM: A New Bus Line Network Optimization Method Based on Taxi Passenger Flow Conversion -- BDCP:A Framework for Big Data Copyright Protection Based on Digital Watermarking -- A Privacy-preserving Attribute-Based Access Control Scheme -- Checking an Authentication of Person Depends on RFID with Thermal Image -- Integrating Ant Colony Algorithm and Node Centrality to Improve Prediction of Information Diffusion in Social Networks -- An efficient provable multi-copy data possession scheme with data dynamics -- An Enhanced Key Management Scheme for LoRaWAN -- Identifying Devices of the Internet of Things using Machine Learning on Clock Characteristics -- ^A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical Systems -- Interacting with the Internet of Things using Smart Contracts and Blockchain Technologies -- Research on Multi-Focus Image Fusion Algorithm Based on Quadtree -- Uncertainty Evaluation for Big Data of Mass Standards in a Key Comparison -- Research on Wireless Spectrum Sensing Technology Based on Machine Learning -- The Safety Detection for Double Tapered Roller Bearing Based on Deep Learning -- Malicious Domain Name Recognition Based on Deep Neural Networks -- Investigation on Unauthorized Human Activity Watching through Leveraging Wi-Fi Signals -- E2STA: An Energy-Efficient Spatio-Temporal Query Algorithm for Wireless Sensor Networks. 000857505 506__ $$aAccess limited to authorized users. 000857505 520__ $$aThis book constitutes the refereed proceedings of the 11th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage. The 45 revised full papers were carefully reviewed and selected from 120 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage. 000857505 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed December 18, 2018). 000857505 650_0 $$aComputer security$$vCongresses. 000857505 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000857505 650_0 $$aData protection$$vCongresses. 000857505 7001_ $$aWang, Guojun$$c(Computer scientist),$$eeditor. 000857505 7001_ $$aChen, Jinjun,$$eeditor. 000857505 7001_ $$aYang, Laurence Tianruo,$$eeditor. 000857505 77608 $$iPrint version: $$z9783030053444 000857505 830_0 $$aLecture notes in computer science ;$$v11342. 000857505 830_0 $$aLNCS sublibrary.$$nSL 3,$$pInformation systems and applications, incl. Internet/Web, and HCI. 000857505 852__ $$bebk 000857505 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-05345-1$$zOnline Access$$91397441.1 000857505 909CO $$ooai:library.usi.edu:857505$$pGLOBAL_SET 000857505 980__ $$aEBOOK 000857505 980__ $$aBIB 000857505 982__ $$aEbook 000857505 983__ $$aOnline 000857505 994__ $$a92$$bISE