000944185 000__ 05334cam\a2200601M\\4500 000944185 001__ 944185 000944185 005__ 20230306152301.0 000944185 006__ m\\\\\o\\d\\\\\\\\ 000944185 007__ cr\un\nnnunnun 000944185 008__ 201002s2020\\\\sz\\\\\\o\\\\\101\0\eng\d 000944185 019__ $$a1198557501$$a1198557773$$a1198558310 000944185 020__ $$a9783030602482$$q(electronic book) 000944185 020__ $$a3030602486$$q(electronic book) 000944185 020__ $$z9783030602475 000944185 0247_ $$a10.1007/978-3-030-60248-2$$2doi 000944185 035__ $$aSP(OCoLC)on1201562400 000944185 035__ $$aSP(OCoLC)1201562400$$z(OCoLC)1198557501$$z(OCoLC)1198557773$$z(OCoLC)1198558310 000944185 040__ $$aFIE$$beng$$cFIE$$dOCLCO$$dEBLCP$$dYDX$$dGZM$$dYDXIT$$dGW5XE$$dOCLCO$$dOCLCF$$dOCL 000944185 049__ $$aISEA 000944185 050_4 $$aQA76.9.A73$$bA44 2020 000944185 08214 $$a004.2/2$$223 000944185 1112_ $$aInternational Conference on Algorithms and Architectures for Parallel Processing$$n(20th :$$d2020 :$$cNew York, N.Y.) 000944185 24510 $$aAlgorithms and architectures for parallel processing :$$b20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2-4, 2020, Proceedings.$$nPart III /$$cMeikang Qiu (ed.). 000944185 2463_ $$aICA3PP 2020 000944185 264_1 $$aCham, Switzerland :$$bSpringer,$$c[2020] 000944185 300__ $$a1 online resource 000944185 336__ $$atext$$btxt$$2rdacontent 000944185 337__ $$acomputer$$bc$$2rdamedia 000944185 338__ $$aonline resource$$bcr$$2rdacarrier 000944185 4901_ $$aLecture notes in computer science ;$$v12454 000944185 4901_ $$aLNCS sublibrary. SL 1, Theoretical computer science and general issues 000944185 500__ $$aIncludes author index. 000944185 5050_ $$aIntro -- Preface -- Organization -- Contents -- Part III -- Parallel Computing with Cybersecurity and Blockchain (PCB) -- Understanding Privacy-Preserving Techniques in Digital Cryptocurrencies -- 1 Introduction -- 2 Privacy Issues in Digital Cryptocurrencies -- 3 Classification of Privacy-Preserving Techniques -- 3.1 Privacy-Preserving Techniques of Transaction -- 3.2 Privacy-Preserving Techniques of Smart Contract -- 3.3 Privacy-Preserving Techniques of On-Chain Data -- 4 Zero-Knowledge Proofs -- 4.1 Trusted Setup -- 4.2 Verification Efficiency -- 4.3 Safety Performance 000944185 5058_ $$a5 Discussions and Future Work -- 6 Conclusions -- References -- LNBFSM: A Food Safety Management System Using Blockchain and Lightning Network -- 1 Introduction -- 2 System Design -- 2.1 Overall Structure -- 2.2 Data Structure -- 2.3 Smart Contract -- 2.4 Consensus Mechanism -- 3 Algorithm -- 3.1 QueryVerification Algorithm -- 3.2 Balance Algorithm -- 3.3 TransactionChannelDown Algorithm -- 4 Evaluations and Findings -- 5 Conclusions -- References -- Reputation-Based Trustworthy Supply Chain Management Using Smart Contract -- 1 Introduction -- 2 Proposed Model 000944185 5058_ $$a2.1 Key Components and Model Design -- 2.2 Reputation Assessment Blockchain (RAB) -- 3 Algorithms -- 3.1 Quality Status Generation (QSG) Algorithm -- 3.2 Token-Based Reputation Reward/Punishment Algorithm -- 4 Experiment and the Results -- 5 Conclusions -- References -- Content-Aware Anomaly Detection with Network Representation Learning -- 1 Introduction -- 2 Background and Related Works -- 2.1 Network Embedding -- 2.2 Network Anomaly Detection -- 2.3 Network Embedding Based Anomaly Detection -- 3 Problem Formulation -- 4 The Proposed Content-Aware Anomaly Detection Method 000944185 5058_ $$a4.1 Content-Aware Network Anomaly Detection Method -- 4.2 Network Embedding Objective -- 4.3 Auto-encoder Based Anomaly Detection -- 5 Experiments -- 5.1 Benchmark Networks -- 5.2 Baseline Methods -- 5.3 Experiment Settings and Evaluation Metrics -- 5.4 Experiment Results -- 6 Conclusion -- References -- Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree -- 1 Introduction -- 2 Related Work -- 2.1 Centralized Data Integrity Verification -- 2.2 Blockchain Based Data Integrity Verification -- 3 Definitions and Preliminaries -- 3.1 System Model 000944185 5058_ $$a3.2 Threat Model and Design Goals -- 3.3 Preliminaries -- 4 The Proposed Blockchain Based Data Integrity Verification Scheme -- 4.1 Structure of T-Merkle Tree -- 4.2 Construction of the Proposed Scheme -- 4.3 Discussion on Decentralized Verification -- 5 Security Analysis -- 5.1 Correctness -- 5.2 Unforgeability -- 6 Performance Evaluation -- 6.1 Performance Analysis -- 6.2 Experimental Results -- 7 Conclusion -- References -- IM-ACS: An Access Control Scheme Supporting Informal Non-malleable Security in Mobile Media Sharing System -- 1 Introduction -- 2 Related Works 000944185 506__ $$aAccess limited to authorized users. 000944185 650_0 $$aParallel processing (Electronic computers)$$vCongresses. 000944185 650_0 $$aComputer architecture$$vCongresses. 000944185 650_0 $$aComputer science$$xMathematics. 000944185 650_0 $$aApplication software. 000944185 650_0 $$aSoftware engineering. 000944185 650_0 $$aData structures (Computer science) 000944185 650_0 $$aComputer security. 000944185 7001_ $$aQiu, Meikang,$$eeditor. 000944185 77608 $$iPrint version:$$z3030602443$$z9783030602444$$z3030602478$$z9783030602475$$z3030602389$$z9783030602383$$w(OCoLC)1191238717 000944185 830_0 $$aLecture notes in computer science ;$$v12454. 000944185 830_0 $$aLNCS sublibrary.$$nSL 1,$$pTheoretical computer science and general issues. 000944185 852__ $$bebk 000944185 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=https://dx.doi.org/10.1007/978-3-030-60248-2$$zOnline Access 000944185 909CO $$ooai:library.usi.edu:944185$$pGLOBAL_SET 000944185 980__ $$aEBOOK 000944185 980__ $$aBIB 000944185 982__ $$aEbook 000944185 983__ $$aOnline 000944185 994__ $$a92$$bISE