Advertisement

Trusted Computing and Information Security

12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers

  • Huanguo Zhang
  • Bo Zhao
  • Fei Yan
Conference proceedings CTCIS 2018

Part of the Communications in Computer and Information Science book series (CCIS, volume 960)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Mingming Li, Jiansheng Guo, Jingyi Cui, Linhong Xu
    Pages 16-31
  3. Yan Cui, Jingfeng Xue, Yong Wang, Zhenyan Liu, Ji Zhang
    Pages 51-64
  4. Chun Shan, Jie Gao, Changzhen Hu, Fang Guan, Xiaolin Zhao
    Pages 65-83
  5. Yong Fang, Kai Liu, Fan Jing, Zheng Zuo
    Pages 84-98
  6. Mingdi Xu, Xueyuan Gao, Fan Zhang
    Pages 99-112
  7. Bo Zhao, Rui Guo, Peiru Fan, Zhijun Wu
    Pages 130-148
  8. Lipeng Wang, Mingsheng Hu, Zijuan Jia, Bei Gong, Yanyan Yang, Xinxin Liu et al.
    Pages 184-202
  9. Jingyang Yu, Wenchang Shi, Bo Qin, Bin Liang
    Pages 203-219
  10. Yong Wang, Jiantao Song, Jia Lou
    Pages 220-238
  11. Jianwei Jia, Houzhen Wang, Huanguo Zhang, Shijia Wang, Jinhui Liu
    Pages 255-269
  12. Zejin Zhu, Guojun Peng
    Pages 270-285
  13. Xinxin Liu, Zhijuan Jia, Erfeng Xu, Bei Gong, Lipeng Wang
    Pages 286-300
  14. Ying Zhang, Peisong Li, Jun Wang, Mingxing Wang, Dengpan Ye
    Pages 301-317
  15. Yue Yuan, Anuhan Torgonshar, Wenchang Shi, Bin Liang, Bo Qin
    Pages 318-337
  16. Lichao Chen, Zhanli Li, Zhenhua Chen, Yaru Liu
    Pages 338-359
  17. Lihua Zhang, Panpan Jiang, Qi Yi, Fan Lan, Tengfei Jiang
    Pages 360-371
  18. Huaizhi Yan, Xin Zhang, Jiangwei Xie, Changzhen Hu
    Pages 372-388
  19. Patrick Kwaku Kudjo, Jinfu Chen, Solomon Mensah, Richard Amankwah
    Pages 389-407
  20. Back Matter
    Pages 409-410

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2018, held in Wuhan, China, in October 2018.

The 24 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, and network security.

Keywords

artificial intelligence authentication cloud computing computer crime computer networks cryptography data mining data security digital signature electronic document identification systems encryption malware public key cryptography routing protocols sensor networks telecommunication networks World Wide Web

Editors and affiliations

  • Huanguo Zhang
    • 1
  • Bo Zhao
    • 2
  • Fei Yan
    • 3
  1. 1.School of Cyber Science and EngineeringWuhan UniversityWuhanChina
  2. 2.School of Cyber Science and EngineeringWuhan UniversityWuhanChina
  3. 3.School of Cyber Science and EngineeringWuhan UniversityWuhanChina

Bibliographic information

  • DOI https://doi.org/10.1007/978-981-13-5913-2
  • Copyright Information Springer Nature Singapore Pte Ltd. 2019
  • Publisher Name Springer, Singapore
  • eBook Packages Computer Science
  • Print ISBN 978-981-13-5912-5
  • Online ISBN 978-981-13-5913-2
  • Series Print ISSN 1865-0929
  • Series Online ISSN 1865-0937
  • Buy this book on publisher's site