Frontiers in Cyber Security First International Conference FCS 2018 Chengdu China November 5 7 2018 Proceedings 1st Edition by Fagen Li, Tsuyoshi Takagi, Chunxiang Xu, Xiaosong Zhang – Ebook PDF Instant Download/Delivery: 9811330956, 978- 9811330957
Full download Frontiers in Cyber Security First International Conference FCS 2018 Chengdu China November 5 7 2018 Proceedings 1st Edition after payment
Product details:
ISBN 10: 9811330956
ISBN 13: 978-9811330957
Author: Fagen Li, Tsuyoshi Takagi, Chunxiang Xu, Xiaosong Zhang
Frontiers in Cyber Security First International Conference FCS 2018 Chengdu China November 5 7 2018 Proceedings 1st Table of contents:
Cryptography and Privacy-Preserving Techniques
-
Symmetric Key Cryptography
- Techniques in symmetric encryption and key management.
-
Public Key Cryptography
- RSA, Elliptic Curve Cryptography (ECC), and other public key encryption methods.
-
Post-quantum Cryptography
- Cryptographic techniques designed to be secure against quantum computing attacks.
-
Privacy-Preserving Machine Learning
- Techniques like differential privacy and secure multi-party computation in machine learning to ensure data privacy.
-
On k–error Linear Complexity of Zeng-Cai-Tang-Yang Generalized Cyclotomic Binary Sequences of Period
- Advanced cryptographic sequence analysis for security in binary systems.
-
Novel Secure Privacy-Preserving Decentralized Attribute-Based Encryption
- A type of encryption providing both privacy and access control in a decentralized manner.
-
Efficient Lattice FIBS for Identities in a Small Universe
- Lattice-based cryptography and its use in identity-based cryptosystems.
-
Efficient KEA-Style Lattice-Based Authenticated Key Exchange
- Lattice-based cryptographic protocols for secure key exchange.
-
Identity-Based Multi-bit Proxy Re-encryption Over Lattice in the Standard Model
- Proxy re-encryption schemes that enable secure data sharing in identity-based cryptosystems.
-
One-Round Authenticated Group Key Establishment Using Multilinear Maps
- Methods for securely establishing shared group keys using advanced cryptographic structures.
E-Voting and Authentication Systems
-
Heterogeneous Deniable Authentication for E-Voting Systems
- Authentication techniques that ensure security and privacy in e-voting systems, with the possibility of deniability.
-
An Authentication Approach for Multiple-User Location-Based Queries
- Secure authentication methods for location-based queries with multiple users.
Cloud Security and Data Protection
-
Cloud Security and Data Deduplication
- Techniques for securing cloud storage and ensuring data duplication is prevented.
-
Analysis and Improvement of an Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy
- Public auditing mechanisms for cloud storage, particularly for dynamic data and proxy re-encryption.
-
Compressive Sensing Encryption Scheme with Anonymous Traitor Tracing for Cloud Storage Security
- Methods for encryption and secure storage in the cloud, including traitor tracing techniques.
-
A Hybrid Data Deduplication Approach in Entity Resolution Using Chromatic Correlation Clustering
- Hybrid approaches for data deduplication in cloud storage using clustering algorithms for better resolution.
-
Secure Data Deduplication with Ownership Management and Sharing in Cloud Storage
- Advanced approaches for secure data management in cloud storage, focusing on ownership and access control.
Access Control
-
An SDN-Based Wireless Authentication and Access Control Security Solution
- Security solutions using Software Defined Networking (SDN) for wireless authentication and access control.
-
Secure and Achievable Heterogeneous Access Control Scheme for Wireless Body Area Networks
- Access control mechanisms designed for heterogeneous environments like Wireless Body Area Networks (WBAN).
Attack Detection and Behavior Analysis
-
Intelligent Vehicle Knowledge Representation and Anomaly Detection Using Neural Knowledge DNA
- Use of neural networks and AI for anomaly detection in vehicle systems.
-
A Violent Behavior Detection Algorithm Combining Streakline Model with Variational Model
- Advanced algorithms for detecting violent behaviors using computational models like streaklines and variations.
System and Network Security
-
A Novel Digital Rights Management in P2P Networks Based on Bitcoin System
- Integration of digital rights management (DRM) in peer-to-peer networks using blockchain technologies like Bitcoin.
-
LWSQR: Lightweight Secure QR Code
- Lightweight methods for securing QR codes used in a variety of applications.
-
Active Shield Design for Security Chip in Smart Grid
- Security chip design and shielding methods for protecting smart grids against cyber threats.
-
A Radio Frequency Fingerprint Extraction Method Based on Cluster Center Difference
- Techniques for identifying and extracting radio frequency fingerprints for device authentication and security in IoT environments.
People also search for Frontiers in Cyber Security First International Conference FCS 2018 Chengdu China November 5 7 2018 Proceedings 1st :
international conference on frontiers in cyber security
frontier internet security review
a cybersecurity incident
electronic frontier foundation (eff)
human factors in cyber security ppt
Tags:
Fagen Li,Tsuyoshi Takagi,Chunxiang Xu,Xiaosong Zhang,Frontiers,Cyber,Security,International,Conference,Chengdu China,Proceedings 1st