000 03607nam a22005535i 4500
001 978-3-031-30623-5
003 DE-He213
005 20240423130042.0
007 cr nn 008mamaa
008 230425s2023 sz | s |||| 0|eng d
020 _a9783031306235
_9978-3-031-30623-5
024 7 _a10.1007/978-3-031-30623-5
_2doi
050 4 _aTK7885-7895
050 4 _aTK5105.5-5105.9
072 7 _aUK
_2bicssc
072 7 _aCOM067000
_2bisacsh
072 7 _aUK
_2thema
082 0 4 _a621.39
_223
082 0 4 _a004.6
_223
245 1 0 _aSecurity and Privacy in New Computing Environments
_h[electronic resource] :
_b5th EAI International Conference, SPNCE 2022, Xi’an, China, December 30-31, 2022, Proceedings /
_cedited by Qi Jiang, Xinghua Li, Ding Wang.
250 _a1st ed. 2023.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2023.
300 _aXIV, 179 p. 50 illus., 39 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-822X ;
_v496
505 0 _aAuthentication and key agreement -- User Authentication Using Body Vibration Characteristics -- An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server -- Efficient two-party authentication key agreement protocol using reconciliation mechanism from lattice -- Anonymous and Practical Multi-Factor Authentication for Mobile Devices Using Two-Server Architecture -- Data security -- Cross-chain Data Auditing for Medical IoT Data -- Outsourced Privacy-Preserving SVM Classifier Model over Encrypted Data in IoT -- A Scheme of Anti Gradient Leakage of Federated Learning Based on Blockchain -- Analysis of a New Improved AES S-box Structure Rong -- Network security -- Social Internet of Tings trust management based on implicit social relationship -- Romeo: SGX-based Software Anti-Piracy Framework -- P-TECS: An Energy Balance Algorithm for Opportunistic Networks Integrating Multiple Node Attributes -- Network Situation Awareness Model based on Incomplete Information Game.
520 _aThis book constitutes the refereed proceedings of the 5th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022, held in Xi’an, china, in December 30-31, 2022. The 12 full papers were selected from 38 submissions and are grouped in thematical parts as: authentication and key agreement; data security; network security.
650 0 _aComputer engineering.
650 0 _aComputer networks .
650 1 4 _aComputer Engineering and Networks.
700 1 _aJiang, Qi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aLi, Xinghua.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aWang, Ding.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031306228
776 0 8 _iPrinted edition:
_z9783031306242
830 0 _aLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
_x1867-822X ;
_v496
856 4 0 _uhttps://doi.org/10.1007/978-3-031-30623-5
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNS
942 _cSPRINGER
999 _c184517
_d184517