Frontiers in Cyber Security Second International Conference FCS 2019 Xi an China November 15 17 2019 Proceedings 1st edition by Bazhong Shen – Ebook PDF Instant Download/DeliveryISBN: 9811508189, 9789811508189
Full download Frontiers in Cyber Security Second International Conference FCS 2019 Xi an China November 15 17 2019 Proceedings 1st edition after payment.
Product details:
ISBN-10 : 9811508189
ISBN-13 : 9789811508189
Author: Bazhong Shen
This book constitutes the proceedings of the Second International Conference on Frontiers in Cyber Security, FCS 2019, held in Xi’an, China, in November 2019. The 20 full papers along with the 2 short papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on: symmetric key cryptography; public key cryptography; post-quantum cryptography: signature; attack and behavior detection; authenticated key agreement; blockchain; system and network security.
Frontiers in Cyber Security Second International Conference FCS 2019 Xi an China November 15 17 2019 Proceedings 1st Table of contents:
- Symmetric Key Cryptography
- Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud
- Public Key Cryptography
- Anonymous Leakage-Resilient Ciphertext-Policy Attribute-Based Encryption Supporting Direct Revocation
- Cryptographic Reverse Firewalls for Identity-Based Encryption
- Identity-Based Encryption Resilient to Continual Leakage Without Random Oracles
- Post-quantum Cryptography
- CLIBDA: A Deniable Authentication Scheme for Pervasive Computing Environment
- Leveled Lattice-Based Linearly Homomorphic Signature Scheme in the Standard Model for Network Coding
- Symmetric Lattice-Based PAKE from Approximate Smooth Projective Hash Function and Reconciliation Mechanism
- Zero-Knowledge Proofs for Improved Lattice-Based Group Signature Scheme with Verifier-Local Revocation
- Post-Quantum Pseudorandom Functions from Mersenne Primes
- Signature
- An Efficient Proxy Re-Signature Over Lattices
- Batch Verification of Linkable Ring Signature in Smart Grid
- Hierarchical Identity-Based Signature over Verifiable Random Function
- Attack and Behavior Detection
- Analysis of Ciphertext Policy Hidden Attribute-Based Encryption and Its Improved Method
- Implementing Attacks on the Approximate Greatest Common Divisor Problem
- M4D: A Malware Detection Method Using Multimodal Features
- New Key Recovery Attack on the MICKEY Family of Stream Ciphers
- Authenticated Key Agreement
- A General Construction for Password-Based Authenticated Key Exchange from Witness PRFs
- Certificateless Authenticated Key Agreement for Decentralized WBANs
- Blockchain
- A Certificateless Proxy Re-encryption Scheme for Cloud-Based Blockchain
- A Novel Fair and Verifiable Data Trading Scheme
- Public Audit Scheme of Shared Data Based on Blockchain
- System and Network Security
- A Hybrid Key Management Scheme for Wireless Sensor Network
People also search for Frontiers in Cyber Security Second International Conference FCS 2019 Xi an China November 15 17 2019 Proceedings 1st:
what is frontiers in psychology
frontiers in communication predatory
frontiers cyberspace
frontiers in computers
frontiers cyberspace levels
Tags: Frontiers, Cyber Security, International Conference, China November, Bazhong Shen