Advertisement

Security and Privacy in New Computing Environments

Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings

  • Jin Li
  • Zheli Liu
  • Hao Peng
Conference proceedings SPNCE 2019

Table of contents

  1. Front Matter
    Pages i-xiv
  2. Privacy and Security Analysis

    1. Front Matter
      Pages 1-1
    2. Jia-lei Zhang, Ming-sheng Hu, Bei Gong, Zhi-Juan Jia, Li-Peng Wang
      Pages 3-14
    3. Ya-ge Cheng, Zhi-juan Jia, Bei Gong, Li-peng Wang, Yan-fang Lei
      Pages 15-28
    4. Jingyu Jia, Yuduo Wu, Yue Guo, Jiqiang Gao, Jin Peng, Peng Ran et al.
      Pages 46-57
    5. Mingxin Yin, Jiqiang Gao, Xiaojie Guo, Mengyao Sun, Zheli Liu, Jianzhong Zhang et al.
      Pages 73-86
    6. An-Sheng Yin, Shun-Yi Zhang
      Pages 87-95
    7. Xiuliang Mo, Pengyuan Chen, Jianing Wang, Chundong Wang
      Pages 96-104
    8. Chunhui Zhao, Chundong Wang, Wenbai Zheng
      Pages 105-113
    9. Hao Peng, Zhe Kan, Dandan Zhao, Jianmin Han, Zhaolong Hu
      Pages 114-124
    10. Lin Yao, Xinyu Wang, Zhenyu Chen, Guowei Wu
      Pages 125-140
    11. Zakaria Sahnoune, Esma Aïmeur
      Pages 141-151
    12. Yanan Zhang, Shengqiang Han, Stevenyin Zhong, Peiji Shi, Xuebin Shao
      Pages 178-197
    13. Yanan Zhang, Peiji Shi, Yangyang Liu, Shengqiang Han, Baoying Mu, Jia Zheng
      Pages 198-209
    14. Qi Zhang, Shaojing Fu, Nan Jia, Jianchao Tang, Ming Xu
      Pages 210-225
    15. Yong Ding, Huiyong Wang, Zhiqiang Gao, Yujue Wang, Kefeng Fan, Shijie Tang
      Pages 246-267
    16. Yong Ding, Xiaoqing Cui, Huiyong Wang, Yujue Wang
      Pages 268-281
    17. Xiaokang Liu, Hui Tian, Jie Liu, Xiang Li, Jing Lu
      Pages 282-297
    18. Chundong Wang, Kongbo Li, Yunkun Tian, Xiaonan He
      Pages 298-307
  3. Internet of Things and Cloud Computing

    1. Front Matter
      Pages 309-309
    2. Maryam Vahabi, Hossein Fotouhi, Mats Björkman
      Pages 311-317
    3. Jianchao Tang, Shaojing Fu, Ming Xu
      Pages 318-332
    4. Jiachen Liu, Yintu Bao, Yingcong Liu, Wuyungerile Li
      Pages 333-341
    5. Tong Shao, Yuechi Tian, Zhen Li, Xuan Jing
      Pages 354-361
    6. Jian Xu, Yanbo Yu, Qingyu Meng, Qiyu Wu, Fucai Zhou
      Pages 362-377
    7. Jia Wang, Fang Peng, Hui Tian, Wenqi Chen, Jing Lu
      Pages 378-387
    8. Jing Yang, Liming Wang, Zhen Xu, Jigang Wang, Tian Tian
      Pages 388-400
    9. Kaiyu Wang, Nan Liu, Jiapeng Xiu, Zhengqiu Yang
      Pages 401-407
  4. System Building

    1. Front Matter
      Pages 409-409
    2. Na Zong, Wuyungerile Li, Pengyu Li, Bing Jia, Xuebin Ma
      Pages 421-432
    3. Hao Peng, Zhe Kan, Dandan Zhao, Jianmin Han, Zhaolong Hu
      Pages 440-449
    4. Hao Peng, Zhe Kan, Dandan Zhao, Zhonglong Zheng, Feilong Lin
      Pages 450-458
    5. Man Zhou, Lansheng Han, Hongwei Lu, Cai Fu
      Pages 459-471
    6. Yong Ding, Decun Luo, Hengkui Xiang, Chenjun Tang, Lingang Liu, Xiuqing Zou et al.
      Pages 472-484
    7. Jie Liu, Hui Tian, Xiaokang Liu, Jing Lu
      Pages 485-497
    8. Li Su, Meiling Chen, Jin Peng, Peng Ran
      Pages 509-517
  5. Scheme, Model and Application for Data

    1. Front Matter
      Pages 519-519
    2. Yanfang Lei, Mingsheng Hu, Bei Gong, Lipeng Wang, Yage Cheng
      Pages 521-537
    3. Wen-jun Cui, Zhi-juan Jia, Ming-sheng Hu, Bei-Gong, Li-peng Wang
      Pages 538-544
    4. Ruitao Hou, Hequn Xian, Xiao Wang, Jing Li
      Pages 545-550
    5. Saiyu Hao, Jun Long, Yingchuan Yang
      Pages 551-563

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 2nd EAI International Conference on Security and Privacy in New Computing Environments, SPNCE 2019, held in Tianjin, China, in April 2019. The 62 full papers were selected from 112 submissions and are grouped into topics on privacy and security analysis, Internet of Things and cloud computing, system building, scheme, model and application for data, mechanism and method in new computing.

Keywords

artificial intelligence authentication computer crime computer networks cryptography data mining data privacy data security internet network security privacy public key cryptography signal processing software engineering telecommunication networks user interfaces wireless networks wireless telecommunication systems World Wide Web

Editors and affiliations

  • Jin Li
    • 1
  • Zheli Liu
    • 2
  • Hao Peng
    • 3
  1. 1.Guangzhou UniversityGuangdongChina
  2. 2.College of Cyberspace SecurityNankai UniversityTianjinChina
  3. 3.College of Mathematics and Computer ScienceZhejiang Normal UniversityZhejiangChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-21373-2
  • Copyright Information ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-21372-5
  • Online ISBN 978-3-030-21373-2
  • Series Print ISSN 1867-8211
  • Series Online ISSN 1867-822X
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Aerospace
Engineering