Amazon cover image
Image from Amazon.com

Algorithms and architectures for parallel processing : 20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2-4, 2020, Proceedings. Part III / Meikang Qiu (ed.).

By: (20th : International Conference on Algorithms and Architectures for Parallel Processing (20th : 2020 : New York, N.Y.)Contributor(s): Qiu, Meikang [editor.]Material type: TextTextSeries: Serienbezeichnung | Lecture notes in computer science ; 12454. | LNCS sublibrary. SL 1, Theoretical computer science and general issues.Publisher: Cham, Switzerland : Springer, [2020]Description: 1 online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783030602482; 3030602486Other title: ICA3PP 2020Subject(s): Parallel processing (Electronic computers) -- Congresses | Computer architecture -- Congresses | Computer science -- Mathematics | Application software | Software engineering | Data structures (Computer science) | Computer security | Parallel processing (Electronic computers) | Computer architecture | Application software | Computer organization | Computer science -- Mathematics | Computer security | Data structures (Computer science) | Software engineeringGenre/Form: Conference papers and proceedings. | Electronic books. | Electronic books. Additional physical formats: No titleDDC classification: 005.1 | 004.2/2 LOC classification: QA76.58 | .I528 2020ebQA76.9.A73 | A44 2020Online resources: Click here to access online
Contents:
Intro -- Preface -- Organization -- Contents -- Part III -- Parallel Computing with Cybersecurity and Blockchain (PCB) -- Understanding Privacy-Preserving Techniques in Digital Cryptocurrencies -- 1 Introduction -- 2 Privacy Issues in Digital Cryptocurrencies -- 3 Classification of Privacy-Preserving Techniques -- 3.1 Privacy-Preserving Techniques of Transaction -- 3.2 Privacy-Preserving Techniques of Smart Contract -- 3.3 Privacy-Preserving Techniques of On-Chain Data -- 4 Zero-Knowledge Proofs -- 4.1 Trusted Setup -- 4.2 Verification Efficiency -- 4.3 Safety Performance
5 Discussions and Future Work -- 6 Conclusions -- References -- LNBFSM: A Food Safety Management System Using Blockchain and Lightning Network -- 1 Introduction -- 2 System Design -- 2.1 Overall Structure -- 2.2 Data Structure -- 2.3 Smart Contract -- 2.4 Consensus Mechanism -- 3 Algorithm -- 3.1 QueryVerification Algorithm -- 3.2 Balance Algorithm -- 3.3 TransactionChannelDown Algorithm -- 4 Evaluations and Findings -- 5 Conclusions -- References -- Reputation-Based Trustworthy Supply Chain Management Using Smart Contract -- 1 Introduction -- 2 Proposed Model
2.1 Key Components and Model Design -- 2.2 Reputation Assessment Blockchain (RAB) -- 3 Algorithms -- 3.1 Quality Status Generation (QSG) Algorithm -- 3.2 Token-Based Reputation Reward/Punishment Algorithm -- 4 Experiment and the Results -- 5 Conclusions -- References -- Content-Aware Anomaly Detection with Network Representation Learning -- 1 Introduction -- 2 Background and Related Works -- 2.1 Network Embedding -- 2.2 Network Anomaly Detection -- 2.3 Network Embedding Based Anomaly Detection -- 3 Problem Formulation -- 4 The Proposed Content-Aware Anomaly Detection Method
4.1 Content-Aware Network Anomaly Detection Method -- 4.2 Network Embedding Objective -- 4.3 Auto-encoder Based Anomaly Detection -- 5 Experiments -- 5.1 Benchmark Networks -- 5.2 Baseline Methods -- 5.3 Experiment Settings and Evaluation Metrics -- 5.4 Experiment Results -- 6 Conclusion -- References -- Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree -- 1 Introduction -- 2 Related Work -- 2.1 Centralized Data Integrity Verification -- 2.2 Blockchain Based Data Integrity Verification -- 3 Definitions and Preliminaries -- 3.1 System Model
3.2 Threat Model and Design Goals -- 3.3 Preliminaries -- 4 The Proposed Blockchain Based Data Integrity Verification Scheme -- 4.1 Structure of T-Merkle Tree -- 4.2 Construction of the Proposed Scheme -- 4.3 Discussion on Decentralized Verification -- 5 Security Analysis -- 5.1 Correctness -- 5.2 Unforgeability -- 6 Performance Evaluation -- 6.1 Performance Analysis -- 6.2 Experimental Results -- 7 Conclusion -- References -- IM-ACS: An Access Control Scheme Supporting Informal Non-malleable Security in Mobile Media Sharing System -- 1 Introduction -- 2 Related Works
Summary: This three-volume set LNCS 12452, 12453, and 12454 constitutes the proceedings of the 20th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2020, in New York City, NY, USA, in October 2020. The total of 142 full papers and 5 short papers included in this proceedings volumes was carefully reviewed and selected from 495 submissions. ICA3PP is covering the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. As applications of computing systems have permeated in every aspects of daily life, the power of computing system has become increasingly critical. This conference provides a forum for academics and practitioners from countries around the world to exchange ideas for improving the efficiency, performance, reliability, security and interoperability of computing systems and applications. ICA3PP 2020 focus on two broad areas of parallel and distributed computing, i.e. architectures, algorithms and networks, and systems and applications.-- Provided by publisher.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

This three-volume set LNCS 12452, 12453, and 12454 constitutes the proceedings of the 20th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2020, in New York City, NY, USA, in October 2020. The total of 142 full papers and 5 short papers included in this proceedings volumes was carefully reviewed and selected from 495 submissions. ICA3PP is covering the many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems. As applications of computing systems have permeated in every aspects of daily life, the power of computing system has become increasingly critical. This conference provides a forum for academics and practitioners from countries around the world to exchange ideas for improving the efficiency, performance, reliability, security and interoperability of computing systems and applications. ICA3PP 2020 focus on two broad areas of parallel and distributed computing, i.e. architectures, algorithms and networks, and systems and applications.-- Provided by publisher.

Includes author index.

Online resource; title from PDF title page (SpringerLink, viewed December 2, 2020).

Intro -- Preface -- Organization -- Contents -- Part III -- Parallel Computing with Cybersecurity and Blockchain (PCB) -- Understanding Privacy-Preserving Techniques in Digital Cryptocurrencies -- 1 Introduction -- 2 Privacy Issues in Digital Cryptocurrencies -- 3 Classification of Privacy-Preserving Techniques -- 3.1 Privacy-Preserving Techniques of Transaction -- 3.2 Privacy-Preserving Techniques of Smart Contract -- 3.3 Privacy-Preserving Techniques of On-Chain Data -- 4 Zero-Knowledge Proofs -- 4.1 Trusted Setup -- 4.2 Verification Efficiency -- 4.3 Safety Performance

5 Discussions and Future Work -- 6 Conclusions -- References -- LNBFSM: A Food Safety Management System Using Blockchain and Lightning Network -- 1 Introduction -- 2 System Design -- 2.1 Overall Structure -- 2.2 Data Structure -- 2.3 Smart Contract -- 2.4 Consensus Mechanism -- 3 Algorithm -- 3.1 QueryVerification Algorithm -- 3.2 Balance Algorithm -- 3.3 TransactionChannelDown Algorithm -- 4 Evaluations and Findings -- 5 Conclusions -- References -- Reputation-Based Trustworthy Supply Chain Management Using Smart Contract -- 1 Introduction -- 2 Proposed Model

2.1 Key Components and Model Design -- 2.2 Reputation Assessment Blockchain (RAB) -- 3 Algorithms -- 3.1 Quality Status Generation (QSG) Algorithm -- 3.2 Token-Based Reputation Reward/Punishment Algorithm -- 4 Experiment and the Results -- 5 Conclusions -- References -- Content-Aware Anomaly Detection with Network Representation Learning -- 1 Introduction -- 2 Background and Related Works -- 2.1 Network Embedding -- 2.2 Network Anomaly Detection -- 2.3 Network Embedding Based Anomaly Detection -- 3 Problem Formulation -- 4 The Proposed Content-Aware Anomaly Detection Method

4.1 Content-Aware Network Anomaly Detection Method -- 4.2 Network Embedding Objective -- 4.3 Auto-encoder Based Anomaly Detection -- 5 Experiments -- 5.1 Benchmark Networks -- 5.2 Baseline Methods -- 5.3 Experiment Settings and Evaluation Metrics -- 5.4 Experiment Results -- 6 Conclusion -- References -- Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree -- 1 Introduction -- 2 Related Work -- 2.1 Centralized Data Integrity Verification -- 2.2 Blockchain Based Data Integrity Verification -- 3 Definitions and Preliminaries -- 3.1 System Model

3.2 Threat Model and Design Goals -- 3.3 Preliminaries -- 4 The Proposed Blockchain Based Data Integrity Verification Scheme -- 4.1 Structure of T-Merkle Tree -- 4.2 Construction of the Proposed Scheme -- 4.3 Discussion on Decentralized Verification -- 5 Security Analysis -- 5.1 Correctness -- 5.2 Unforgeability -- 6 Performance Evaluation -- 6.1 Performance Analysis -- 6.2 Experimental Results -- 7 Conclusion -- References -- IM-ACS: An Access Control Scheme Supporting Informal Non-malleable Security in Mobile Media Sharing System -- 1 Introduction -- 2 Related Works

Powered by Koha