Something of The Book

PDF EPUB Library of e-Books

Introduction to Secure Outsourcing Computation

Introduction to Secure Outsourcing Computation

Author: Xiaofeng Chen

Publisher: Morgan & Claypool Publishers

ISBN: 9781627057929

Category: Computers

Page: 93

View: 759

Download BOOK »
With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive computations or storage has attracted considerable attention in the academic community. In this book, we focus on the latest technologies and applications of secure outsourcing computations. Specially, we introduce the state-of-the-art research for secure outsourcing some specific functions such as scientific computations, cryptographic basic operations, and verifiable large database with update. The constructions for specific functions use various design tricks and thus result in very efficient protocols for real-world applications. The topic of outsourcing computation is a hot research issue nowadays. Thus, this book will be beneficial to academic researchers in the field of cloud computing and big data security.

Introduction to Secure Outsourcing Computation

Introduction to Secure Outsourcing Computation

Author: Xiaofeng Chen

Publisher: Springer Nature

ISBN: 9783031023484

Category: Computers

Page: 79

View: 704

Download BOOK »
With the rapid development of cloud computing, the enterprises and individuals can outsource their sensitive data into the cloud server where they can enjoy high quality data storage and computing services in a ubiquitous manner. This is known as the outsourcing computation paradigm. Recently, the problem for securely outsourcing various expensive computations or storage has attracted considerable attention in the academic community. In this book, we focus on the latest technologies and applications of secure outsourcing computations. Specially, we introduce the state-of-the-art research for secure outsourcing some specific functions such as scientific computations, cryptographic basic operations, and verifiable large database with update. The constructions for specific functions use various design tricks and thus result in very efficient protocols for real-world applications. The topic of outsourcing computation is a hot research issue nowadays. Thus, this book will be beneficial to academic researchers in the field of cloud computing and big data security.

Green, Pervasive, and Cloud Computing

Green, Pervasive, and Cloud Computing

Author: Man Ho Allen Au

Publisher: Springer

ISBN: 9783319571867

Category: Computers

Page: 815

View: 334

Download BOOK »
This book constitutes the proceedings of the 12th International Conference on Green, Pervasive, and Cloud Computing, GPC 2017, held in Cetara, Italy, in May 2017 and the following colocated workshops: First International Workshop on Digital Knowledge Ecosystems 2017; and First Workshop on Cloud Security Modeling, Monitoring and Management, CS3M 2017. The 58 full papers included in this volume were carefully reviewed and selected from 169 initial submissions. They deal with cryptography, security and biometric techniques; advances network services, algorithms and optimization; mobile and pervasive computing; cybersecurity; parallel and distributed computing; ontologies and smart applications; and healthcare support systems.

Security in Computing and Communications

Security in Computing and Communications

Author: Peter Mueller

Publisher: Springer

ISBN: 9789811027383

Category: Computers

Page: 474

View: 576

Download BOOK »
This book constitutes the refereed proceedings of the 4th International Symposium on Security in Computing and Communications, SSCC 2016, held in Jaipur, India, in September 2016. The 23 revised full papers presented together with 16 short papers and an invited paper were carefully reviewed and selected from 136 submissions. The papers are organized in topical sections on cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security.

Security and Cryptography for Networks

Security and Cryptography for Networks

Author: Vassilis Zikas

Publisher: Springer

ISBN: 9783319446189

Category: Computers

Page: 606

View: 746

Download BOOK »
This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. They are organized in topical sections on encryption; memory protection; multi-party computation; zero-knowledge proofs; efficient protocols; outsourcing computation; digital signatures; cryptanalysis; two-party computation; secret sharing; and obfuscation.

Computer Security – ESORICS 2016

Computer Security – ESORICS 2016

Author: Ioannis Askoxylakis

Publisher: Springer

ISBN: 9783319457444

Category: Computers

Page: 623

View: 710

Download BOOK »
The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016. The 60 revised full papers presented were carefully reviewed and selected from 285 submissions. The papers cover a wide range of topics in security and privacy, including data protection: systems security, network security, access control, authentication, and security in such emerging areas as cloud computing, cyber-physical systems, and the Internet of Things.

Computer Security -- ESORICS 2012

Computer Security -- ESORICS 2012

Author: Sara Foresti

Publisher: Springer

ISBN: 9783642331671

Category: Computers

Page: 896

View: 768

Download BOOK »
This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.

Decision and Game Theory for Security

Decision and Game Theory for Security

Author: Arman (MHR) Khouzani

Publisher: Springer

ISBN: 9783319255941

Category: Computers

Page: 371

View: 573

Download BOOK »
This book constitutes the refereed proceedings of the 6th International Conference on Decision and Game Theory for Security, GameSec 2015, held in London, UK, in November 2015. The 16 revised full papers presented together with 5 short papers were carefully reviewed and selected from 37 submissions. Game and decision theory has emerged as a valuable systematic framework with powerful analytical tools in dealing with the intricacies involved in making sound and sensible security decisions. For instance, game theory provides methodical approaches to account for interdependencies of security decisions, the role of hidden and asymmetric information, the perception of risks and costs in human behaviour, the incentives/limitations of the attackers, and much more. Combined with our classical approach to computer and network security, and drawing from various fields such as economic, social and behavioural sciences, game and decision theory is playing a fundamental role in the development of the pillars of the "science of security".

Information Security Theory and Practice

Information Security Theory and Practice

Author: Gerhard P. Hancke

Publisher: Springer

ISBN: 9783319935249

Category: Computers

Page: 189

View: 102

Download BOOK »
This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms.

Computer Security -- ESORICS 2015

Computer Security -- ESORICS 2015

Author: Günther Pernul

Publisher: Springer

ISBN: 9783319241777

Category: Computers

Page: 665

View: 411

Download BOOK »
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.

Cyberspace Safety and Security

Cyberspace Safety and Security

Author: Jaideep Vaidya

Publisher: Springer Nature

ISBN: 9783030373528

Category: Computers

Page: 602

View: 885

Download BOOK »
The two volumes LNCS 11982 and 11983 constitute the proceedings of the 11th International Symposium on Cyberspace Safety and Security, CSS 2019, held in Guangzhou, China, in December 2019. The 61 full papers and 40 short papers presented were carefully reviewed and selected from 235 submissions. The papers cover a broad range of topics in the field of cyberspace safety and security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace. They are organized in the following topical sections: network security; system security; information security; privacy preservation; machine learning and security; cyberspace safety; big data and security; and cloud and security;

Frontier Computing

Frontier Computing

Author: Neil Y. Yen

Publisher: Springer

ISBN: 9789811031878

Category: Technology & Engineering

Page: 1011

View: 651

Download BOOK »
This volume contains the proceedings of the 5th International Conference on Frontier Computing (FC 2016), Tokyo, Japan, July 13-15, 2016. This international meeting provided a forum for researchers to share current understanding of recent advances and emergence in information technology, science, and engineering, with themes in the scope of Communication Networks, Business Intelligence and Knowledge Management, Web Intelligence, and any related fields that further the development of information technology. The articles presented cover a wide spectrum of topics: database and data mining, networking and communications, web and internet of things, embedded system, soft computing, social network analysis, security and privacy, optics communication, and ubiquitous/pervasive computing. Many papers report results of great academic potential and value, and in addition, indicate promising directions of research in the focused realm of this conference series. Readers, including students, academic researchers, and professionals, will benefit from the results presented in this book. It also provides an overview of current research and can be used as a guidebook for those new to the field.