Network and System Security : 13th International Conference, NSS 2019, Sapporo, Japan, December 15-18, 2019, Proceedings (Lecture Notes in Computer Science)

個数:
電子版価格
¥9,017
  • 電子版あり

Network and System Security : 13th International Conference, NSS 2019, Sapporo, Japan, December 15-18, 2019, Proceedings (Lecture Notes in Computer Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 731 p.
  • 言語 ENG
  • 商品コード 9783030369378

Full Description

This book constitutes the proceedings of the 13th International Conference on Network and System Security, NSS 2019, held in Sapporo, Japan, in December 2019.

The 36 full papers and 7 short papers presented together with 4 invited papers in this book were carefully reviewed and selected from 89 initial submissions. The papers cover a wide range of topics in the field, including authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability of computer networks and systems.

Contents

Invited Papers.- Measuring Security of Symmetric Encryption Schemes against On-the-Fly Side-Channel Key-Recovery Attacks.- Unsupervised Insider Detection through Neural Feature Learning and Model Optimisation.- Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey.- A Graph Database-based Approach to Analyze Network Log Files.- Full Papers.- A Privacy-Enhancing Framework for Internet of Things Services.- Using Audio Characteristics for Mobile Device Authentication.- Ethereum Analysis via Node Clustering.- Strong Known Related-Key Attacks and the Security of ECDSA.- Threat Assessment of Enterprise Applications via Graphical Modelling.- A Blockchain-based IoT Data Management System for Secure and Scalable Data Sharing.- Towards Secure Open Banking Architecture: An Evaluation with OWASP.- OutGene: Detecting Undefined Network Attacks with Time Stretching and Genetic Zooms.- OVERSCAN: OAuth 2.0 Scanner for Missing Parameters.- LaT-Voting: Traceable Anonymous E-Voting on Blockchain.- Distributed Secure Storage System Based on Blockchain and TPA.- SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique.- A Practical Dynamic Enhanced BFT protocol.- Pre-adjustment Based Anti-collusion Mechanism for Audio Signals.- Detecting Intruders by User File Access Patterns.- Blockchain-enabled Privacy-preserving Internet of Vehicles: Decentralized and Reputation-based Network Architecture.- Privacy Preserving Machine Learning with Limited Information Leakage.- Blockchain based Owner-Controlled Secure Software Updates for Resource-Constrained.- Sequential Aggregate MACs with Detecting Functionality Revisited.- A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System.- EEG-based Authentication with Variational Universal Background Model.- An Efficient Vulnerability Detection Model for Ethereum Smart Contracts.- A Comparative Study on Network Traffic Clustering.- Tell Them From Me: an Encrypted Application Profiler.- Indoor Security Localization Algorithm Based on Location Discrimination Ability of AP.- Gnocchi: Multiplexed Payment Channels for Cryptocurrencies.- Difficulty of decentralized structure due to rational user behavior on Blockchain.- A DNS Tunneling Detection method based on Deep Learning models to prevent Data Exfiltration.- Cryptanalysis of Raindrop and FBC.- Attribute Based Encryption with Publicly Verifiable Outsourced Decryption.- New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defense Cost.- Lattice based verifiably encrypted double authentication preventing Signatures.- Privacy-Preserving Sequential Data Publishing.- A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter.- Keyed Non-Parametric Hypothesis Tests: Protecting Machine Learning From Poisoning Attacks.- SparkDA: RDD-Based High Performance Data AnonymizationTechnique for Spark Platform.- Short Papers.- An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol.- Traceable and Fully Anonymous Attribute Based Group Signature Scheme with Verifier Local Revocation from Lattices.- Privacy-preserving k-means clustering: an application to driving style Recognition.- Derandomized PACE with Mutual Authentication.- A Muti-attributes-based Trust Model of Internet of Vehicle.- Using Sparse Composite Document Vectors to Classify VBA Macros.- A High-Performance Hybrid Blockchain Systemfor Traceable IoT Applications.

最近チェックした商品