Dengguo Feng - Böcker
Visar alla böcker från författaren Dengguo Feng. Handla med fri frakt och snabb leverans.
7 produkter
7 produkter
1 381 kr
Skickas inom 10-15 vardagar
This book investigates novel accurate and efficient privacy-preserving techniques and their applications in e-Healthcare services. Chapter 4 and Chapter 5 respectively propose an accurate and privacy-preserving similar image retrieval scheme and medical pre-diagnosis scheme over dimension-related medical images and single-label medical records;
1 381 kr
Skickas inom 10-15 vardagar
This book investigates novel accurate and efficient privacy-preserving techniques and their applications in e-Healthcare services. The authors first provide an overview and a general architecture of e-Healthcare and delve into discussions on various applications within the e-Healthcare domain. Simultaneously, they analyze the privacy challenges in e-Healthcare services. Then, in Chapter 2, the authors give a comprehensive review of privacy-preserving and machine learning techniques applied in their proposed solutions. Specifically, Chapter 3 presents an efficient and privacy-preserving similar patient query scheme over high-dimensional and non-aligned genomic data; Chapter 4 and Chapter 5 respectively propose an accurate and privacy-preserving similar image retrieval scheme and medical pre-diagnosis scheme over dimension-related medical images and single-label medical records; Chapter 6 presents an efficient and privacy-preserving multi-disease simultaneous diagnosis scheme over medical records with multiple labels. Finally, the authors conclude the monograph and discuss future research directions of privacy-preserving e-Healthcare services in Chapter 7.
Del 2 - Advances in Computer Science
Trusted Computing
Principles and Applications
Inbunden, Engelska, 2017
1 694 kr
Skickas inom 5-8 vardagar
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such technologies in practice, extending readers from computer science and information science researchers to industrial engineers.
Del 8300 - Lecture Notes in Computer Science
Cyberspace Safety and Security
5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings
Häftad, Engelska, 2013
551 kr
Skickas inom 10-15 vardagar
This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The papers are organized in topical sections named: data and applications security; network and communications security; and cloud security and cyberspace safety.
Information Security and Cryptology
First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings
Häftad, Engelska, 2005
551 kr
Skickas inom 10-15 vardagar
The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware,theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer’s Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous ?elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume. In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as well. All submissions were reviewed by experts in the relevant areas and based on their ranking and strict selection criteria the papers were selected for the various tracks. We note that stricter criteria were applied to papers co-authored by program committee members. We further note that, obviously, no member took part in in?uencing the ranking of his or her own submissions.
1 422 kr
Skickas inom 10-15 vardagar
This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties.
1 422 kr
Skickas inom 10-15 vardagar
This book focuses on the different representations and cryptographic properties of Booleans functions, presents constructions of Boolean functions with some good cryptographic properties.