Limit search to available items
Book Cover
Book
Author ATIS (Conference) (6th : 2015 : Beijing, China)

Title Applications and techniques in information security : 6th international conference, ATIS 2015, Beijing, China, November 4-6, 2015 : proceedings / Wenjia Niu [and six others], (eds.)
Published Heidelberg Springer, [2015]

Copies

Location Call no. Vol. Availability
 MELB  005.8 Aat/Iis 2015  AVAILABLE
Description xvii, 398 pages : illustrations (black and white) ; 24 cm
Series Communications in computer and information science, 1865-0929 ; 557
Communications in computer and information science. 1865-0929 ; 557
Contents Contents note continued: A Lightweight Code-Based Authentication Protocol for RFTD Systems / Chuankun Wu -- An Overview of Ad Hoc Network Security / Ping Xiong -- Trust Computing and Privacy Protection -- Structural Analysis of IWA Social Network / Li Guo -- A Differentially Private Method for Reward-Based Spatial Crowdsourcing / Tianqing Zhu -- Do Applications Perform Its Original Design? A Preliminary Analysis from Internet Big Data / Yanfei Zhang -- Trust Prediction with Trust Antecedent Framework Regularization / Guoyong Cai -- Trust Prediction Based on Interactive Relations Strength / Haiyang He -- Cloud Security and Applications -- You Can't Hide: A Novel Methodology to Defend DDoS Attack Based on Botcloud / Peng Zhang -- Quantitative Evaluation Method of Cloud Security / Wei Ma -- A Large-Scale Distributed Sorting Algorithm Based on Cloud Computing / Weimiao Feng -- Analysis and Exploit of Directory Traversal Vulnerability on VMware / Zhi Chen --
Contents note continued: Decryption and Forensic System for Encrypted iPhone Backup Files Based on Parallel Random Search / Lianhai Wang -- The Method and System Implementation of Unstructured Data Tracking and Forensics / Sheng Chen -- The Design and Implementation of Data Security Management and Control Platform / Kun Ding -- A Data Recovery Method for NTFS Files System / Meijie Zhai -- Design and Implementation of Aircraft Pan-Tilt Control System Based on Mobile Terminal / Jianlong Tan
Contents note continued: OpenStack Vulnerability Detection and Analysis / Zhi Chen -- Tools and Methodologies -- RICS-DFA: Reduced Input Character Set DFA for Memory-Efficient Regular Expression Matching / Hongtao Xie -- A Clustering Approach for Detecting Auto-generated Botnet Domains / JinQiao Shi -- Modeling of Mobile Communication Systems by Electromagnetic Theory in the Direct and Single Reflected Propagation Scenario / Xu Zhang -- Bayesian Reliability Assessment Method for Single NC Machine Tool Under Zero Failures / Liding Wang -- MIRD: Trigram-Based Malicious URL Detection Implanted with Random Domain Name Recognition / Jianlong Tan -- A Novel NB-SVM-Based Sentiment Analysis Algorithm in Cross-Cultural Communication / Yuji Chen -- Time-Varying Impulsive Anticontrol of Discrete-Time System / Ya Shuang Deng -- Leakage Prevention Method for Unstructured Data Based on Classification / Hongxia Ma -- System Design and Implementations --
Machine generated contents note: Cryptograph -- An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map / Ziyi Wang -- An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme / Yuan Li -- Cryptographic Public Key Length Prediction / L.M. Batten -- An Image Encryption Algorithm Based on Chua's Chaos and Baker's Transformation / Hongmin Deng -- Quantum Differential Cryptanalysis to the Block Ciphers / Li Yang -- An Enhanced Authentication Scheme for Virtual Private Network Access Based on Platform Attributes of Multi-level Classification / Zhen Han -- Public Key Timed-Release Attribute-Based Encryption / Chufu Jia -- Color Image Encryption in CIE L*a*b* Space / Ziyi Wang -- Evaluation, Standards and Protocols -- Discover Abnormal Behaviors Using HTTP Header Fields Measurement / Zhenzhen Li -- Reconstruction of Potential Attack Scenarios of the OpenID Protocol Towards Network Forensics Analysis / Gang Yao --
Notes Formerly CIP. Uk
Bibliography Includes bibliographical references and author index
Notes Also published electronically
Subject Computer security -- Congresses.
Information networks -- Security measures -- Congresses.
Genre/Form Conference papers and proceedings.
Author Niu, Wenjia, editor
ISBN 9783662486825 (paperback)
(eBook)