This book constitutes the refereed post-conference proceedings of the 17th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2021, held in November 2020. Due to COVID-19 pandemic the conference was held virtually. The 20 revised full papers were carefully reviewed and selected from 43 submissions. The papers are organized thematically in tracks Machine Learning in Distributed Networks; 5G Networks and Security; IoT Security and Lightweight Cryptography; Network Security; and Privacy-preserving Emerging Networked Applications.
Les mer
This book constitutes the refereed post-conference proceedings of the 17th EAI International Conference on Quality, Reliability, Security and Robustness in Heterogeneous Networks, QShine 2021, held in November 2020. The papers are organized thematically in tracks Machine Learning in Distributed Networks; 5G Networks and Security;
Les mer
Machine Learning in Distributed Networks.- FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation.- Accelerating TEE-based DNN Inference Using Mean Shift Network Pruning.- Towards Secure and Trustworthy Crowdsourcing with Versatile Data Analytics.- Blockchain Networks and Blockchain-based Applications.- Blockchain for IoT : A Critical Analysis Concerning Performance and Scalability.- Toward Achieving Unanimity for Implicit Closings in a Trustless System.- DBS: Blockchain-based privacy-preserving RBAC in IoT.- 5G Networks and Security.- 8 A Lightweight Authentication Protocol for 5G Cellular Network Connected Drones.- Anti-eavesdropping Proportional Fairness Access Control for 5G Networks.- Joint Relay Selection and Frequency Allocationfor D2D Communications.- IoT Security and Lightweight Cryptography 11 Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security.- A UsabilityStudy of Cryptographic API Design.- An S-box Design using Irreducible Polynomial with Affine Transformation for Lightweight Cipher.- The Phantom Gradient Attack: A Study Of Replacement Functions For The XOR Function.- Network Security 15 Topology Validator - Defense against Topology Poisoning Attack in SDN.- Towards an Attention-based Accurate Intrusion Detection Approach.- Avoiding VPN Bottlenecks: Exploring Network-Level client Identity Validation Options.- Privacy-preserving Emerging Networked Applications.- Privacy-Preserving Ranked Searchable Encryption Based on Differential Privacy.- Memory-efficient Encrypted Search using Trusted Execution Environment Viet Vo.
Les mer
Produktdetaljer
ISBN
9783030914233
Publisert
2021-11-17
Utgiver
Vendor
Springer Nature Switzerland AG
Høyde
235 mm
Bredde
155 mm
Aldersnivå
Research, P, 06
Språk
Product language
Engelsk
Format
Product format
Heftet