libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

zhu tianqing (curatore); li yannan (curatore) - information security and privacy

Information Security and Privacy 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15–17, 2024, Proceedings, Part III

;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
140,98 €
NICEPRICE
133,93 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

Springer

Pubblicazione: 07/2024
Edizione: 2024





Trama

This volume constitutes the refereed proceedings of the 29th Australasian Conference, ACISP 2024, held in Sydney, NSW, Australia, during July 15–17, 2024. 

The 70 full papers were carefully reviewed and selected from 232 submission. They are categorized in the following sections: Blockchain Technology, Privacy Enhancing Technologies, System Security, Network Security, AI Security. 





Sommario

Blockchain Technology.- Enhancing Permissioned Blockchains with Controlled Data Authorization.- FXChain a multi consortium blockchain with flexible privacy preserving strategies.- An Efficient Vulnerability Detection for Smart Contracts Using Gated Graph Neural Network.- Lightweight Instance Batch Schemes towards Prover efficient Decentralized Private Computation.- CrossAAD Cross-chain Abnormal Account Detection.- AegisDB Scalable Blockchain Database with Secure Decentralised Load Balancing.- Towards Scalable and Secure IoTs Transactions A New Bi directional Payment Channel without Third Party Monitoring.- Privacy Enhancing Technologies.- Understanding Privacy in Smart Speakers A Narrative Review.- RPPDFL A Robustness and Privacy Preserving Decentralized Federated Learning System.- FedSCD Federated learning with Semi centralization Discrepancy awareness and Dual model Collaboration.- Pirates Anonymous Group Calls Over Fully Untrusted Infrastructure.- SecuPath A Secure and Privacy Preserving Multiparty Path Planning Framework in UAV Applications.- System Security.- TSHMD Explainable Deep Learning for Time Series HPCs based IoT Malware Detection.- Security Research for Android Remote Assistance Apps.- SynBoost Robust Text Generation Model Via Beam Search and Synonym Driven Boosting.- CCED A Configuration Failure Prevention Method for Autonomous Driving Systems.- Action Driven UAV Fingerprint Verification with Perception Data.- AggNoteBot A Robust Botnet Building using Aggressive Cloud Notes.- Network Security.- FSAM Framework for Online CDN based Website Classification.- Towards Private Multi-Operator Network Slicing.- AI Security.- An Encrypted Traffic Classification Framework Based on Higher Interaction Graph Neural Network.- PassTSL Modeling Human Created Passwords through Two Stage Learning.- Detect Llama Finding Vulnerabilities in Smart Contracts using Large Language Models.- MMOOC A Multimodal Misinformation Dataset for Out of Context News Analysis.











Altre Informazioni

ISBN:

9789819751006

Condizione: Nuovo
Collana: Lecture Notes in Computer Science
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:XIII, 464 p. 136 illus., 116 illus. in color.
Pagine Arabe: 464
Pagine Romane: xiii


Dicono di noi