派博傳思國際中心

標(biāo)題: Titlebook: Information Security Applications; 20th International C Ilsun You Conference proceedings 2020 Springer Nature Switzerland AG 2020 formal me [打印本頁]

作者: notable    時(shí)間: 2025-3-21 20:07
書目名稱Information Security Applications影響因子(影響力)




書目名稱Information Security Applications影響因子(影響力)學(xué)科排名




書目名稱Information Security Applications網(wǎng)絡(luò)公開度




書目名稱Information Security Applications網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Information Security Applications被引頻次




書目名稱Information Security Applications被引頻次學(xué)科排名




書目名稱Information Security Applications年度引用




書目名稱Information Security Applications年度引用學(xué)科排名




書目名稱Information Security Applications讀者反饋




書目名稱Information Security Applications讀者反饋學(xué)科排名





作者: 時(shí)代    時(shí)間: 2025-3-21 22:49
Turn On the Lights: User Behavior in Game Environment Using CPTEDter (FPS) to garner much attention. Both MMORPG and FPS requires lower network latency, as the users are constantly required to assess and respond to the gaming environment and other users’ decisions. Our study aims to investigate the users’ psychological behavior by changing the gaming environment.
作者: 預(yù)感    時(shí)間: 2025-3-22 00:58
QR Code Watermarking for Digital Imagesniques like digital watermarking can be used to embed data within a signal for purposes such as digital rights management. This paper investigates a watermarking technique for digital images using QR codes. The advantage of using QR codes for watermarking is that properties of the QR code structure
作者: 故意    時(shí)間: 2025-3-22 06:27
FSF: Code Coverage-Driven Fuzzing for Software-Defined Networkingudies focus on eliciting bugs in such SDN controller via penetration testing or fuzzing without considering code coverage feedback from a target controller under testing. We propose FSF, a code coverage-driven SDN fuzzer. We designed and implemented a fuzzing algorithm to take into account coverage
作者: 誘使    時(shí)間: 2025-3-22 12:34
DroPPPP: A P4 Approach to Mitigating DoS Attacks in SDNployment of services in the past decade. Despite these advantages, the fact that the functionality of SDN relies heavily on the controller with a much less capable data plane creates a single point of failure, which leaves the network susceptible to denial of service (DoS) attacks mainly targeting t
作者: Meditative    時(shí)間: 2025-3-22 13:48
A Secure and Self-tallying E-voting System Based on Blockchainbecause of its properties of tamper resistance and transparency. However, existing schemes either require centralized authorities to tally ballots or can only handle a limited number of voters. This paper tries to propose a self-tallying e-voting system, i.e., the public can verify the validity of a
作者: 現(xiàn)存    時(shí)間: 2025-3-22 19:29
An Extended CTRT for AES-256 model. Though AES-128 whose key length . and block length . can be used in CTRT as a block cipher, AES-256 cannot be used in CTRT due to its intrinsic restriction of .. According to a recent ECRYPT-CSA report, AES-256 is strongly recommended rather than AES-128 for long term protection (security fo
作者: 土產(chǎn)    時(shí)間: 2025-3-22 23:04
A Blind Ring Signature Based on the Short Integer Solution Problemgn on a message on behalf of the group without revealing its identity but also the user who possesses the message to blind it before sending to the group to be signed. Blind ring signature schemes are essential components in e-commercial, e-voting etc. In this paper, we propose the first blind ring
作者: 執(zhí)拗    時(shí)間: 2025-3-23 03:38
A Note on the Invisibility and Anonymity of Undeniable Signature Schemesfy invisibility which implies the inability of a user to determine the validity of a message and signature pair as introduced by Chaum et al. Galbraith and Mao later proposed the notion of anonymity which implies the infeasibility to determine which user has issued the signature. They also proved th
作者: entice    時(shí)間: 2025-3-23 05:53
Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with rupt the secret signing keys. Secret signing keys of VLR schemes consist of tokens which can be used to identify the users. Thus VLR schemes restrict corrupting secret signing keys. VLR schemes can achieve full-anonymity by separating tokens from secret signing keys. However, separation of tokens gi
作者: Electrolysis    時(shí)間: 2025-3-23 12:44
Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessingoriginal or processed image should be obtained when needed. In this paper, a new RDH-EI method for homomorphic encrypted images is proposed by utilizing the additive homomorphism and self-blinding property in Paillier cryptosystem. Specifically, part of the hidden data may be extracted before image
作者: Diaphragm    時(shí)間: 2025-3-23 17:43
Model Selection for Data Analysis in Encrypted Domain: Application to?Simple Linear Regression it requires access to raw data which is often privacy sensitive. In addition, whatever data and fitting procedures are employed, a crucial step is to select the most appropriate model from the given dataset. Model selection is a key ingredient in data analysis for reliable and reproducible statisti
作者: Leisureliness    時(shí)間: 2025-3-23 19:48

作者: 邊緣帶來墨水    時(shí)間: 2025-3-24 00:25
Secret Sharing on Evolving Multi-level Access Structureet sharing schemes, it was assumed that the total number of participants is fixed from the very beginning. However, to meet the state of the art needs, it is required to consider the scenario where any time a new participant can join and the total number of participants is (.) unbounded. Evolving se
作者: obsession    時(shí)間: 2025-3-24 03:07

作者: 不妥協(xié)    時(shí)間: 2025-3-24 08:22

作者: Atmosphere    時(shí)間: 2025-3-24 12:36

作者: Asperity    時(shí)間: 2025-3-24 16:02
Mi Yeon Hong,Ji Won Yoonthe former approach, the total value of the firm’s assets is directly used to determine the default event, which occurs when the firm’s value falls through some boundary. It results that here the default time is a . stopping time with respect to the reference filtration modeling the information flow
作者: DOSE    時(shí)間: 2025-3-24 21:19

作者: 自制    時(shí)間: 2025-3-25 00:48

作者: enhance    時(shí)間: 2025-3-25 03:30
SeongHan Shinontract. If this actually happens, we say that the party defaults, or that the default event occurs. More generally, by a . we mean the risk associated with any kind of credit-linked events, such as: changes in the credit quality (including downgrades or upgrades in credit ratings), variations of cr
作者: BIAS    時(shí)間: 2025-3-25 08:59

作者: Brain-Waves    時(shí)間: 2025-3-25 14:35

作者: 削減    時(shí)間: 2025-3-25 16:21

作者: pulse-pressure    時(shí)間: 2025-3-25 21:08
https://doi.org/10.1007/978-3-030-39303-8formal methods and theory of security; security services; software and application security; network se
作者: 沐浴    時(shí)間: 2025-3-26 02:31

作者: 植物群    時(shí)間: 2025-3-26 05:44

作者: dilute    時(shí)間: 2025-3-26 12:03

作者: Narcissist    時(shí)間: 2025-3-26 13:54

作者: Femish    時(shí)間: 2025-3-26 19:35
Yang-Wai Chow,Willy Susilo,Joonsang Baek,Jongkil Kim
作者: cacophony    時(shí)間: 2025-3-26 23:27

作者: 我正派    時(shí)間: 2025-3-27 03:27
SeongHan Shin,Shota Yamada,Goichiro Hanaoka,Yusuke Ishida,Atsushi Kunii,Junichi Oketani,Shimpei Kuni
作者: flaunt    時(shí)間: 2025-3-27 05:27

作者: Anthropoid    時(shí)間: 2025-3-27 11:00
Maharage Nisansala Sevwandi Perera,Toru Nakamura,Masayuki Hashimoto,Hiroyuki Yokoyama
作者: incarcerate    時(shí)間: 2025-3-27 13:56

作者: debase    時(shí)間: 2025-3-27 18:13
Mi Yeon Hong,Ji Won Yoonn here as a . stopping time, in the terminology of the general theory of stochastic processes (see, e.g., Dellacherie (1972) or Jacod and Shiryaev (1987)). The main tool in this approach is an exogenous specification of the conditional probability of default, given that default has not yet occurred.
作者: Negotiate    時(shí)間: 2025-3-27 23:58
Gwangbae Choi,Serge Vaudenay (for related results, also see Eberlein and Raible (1999) and Eberlein (2001)). In contrast with models presented in the previous chapter, the credit migration process is not exogenously specified, but it is endogenous in a model. It follows a conditionally Markov process with respect to a referenc
作者: Constant    時(shí)間: 2025-3-28 06:08

作者: intellect    時(shí)間: 2025-3-28 09:46
SeongHan Shinhe contract’s settlement. In other words, the reference risk is that part of the contract’s risk, which is associated with the third party; i.e., with the entity, which is not a party in a given agreement. In the present context, the third party is referred to as the reference entity of a given cont
作者: Allergic    時(shí)間: 2025-3-28 12:16

作者: ABYSS    時(shí)間: 2025-3-28 16:39

作者: 安定    時(shí)間: 2025-3-28 19:29

作者: 官僚統(tǒng)治    時(shí)間: 2025-3-29 00:11
A Secure and Self-tallying E-voting System Based on Blockchainers for ballot security and these random numbers will be cancelled out when multiplying all ballots to allow counting the ballots. Secondly, we adopt non-interactive zero knowledge proof to make sure these ballots are valid. Our scheme is proved to be secure.
作者: 帳單    時(shí)間: 2025-3-29 05:26
Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with per proposes a new zero-knowledge protocol to support provers to convince verifiers, that attributes used for creating the signature are valid and have naive tokens. Moreover, this paper offers a new Attribute-Based Group Signature (ABGS) scheme, that uses the proposed protocol and achieves full anonymity.
作者: tattle    時(shí)間: 2025-3-29 07:49
Strengthened PAKE Protocols Secure Against Malicious Private Key Generatorersonating the server. Then, we propose two strengthened PAKE (. and .) protocols that prevents such malicious PKG’s passive/active attacks. Also, we discuss security of the . and . protocols, and compare relevant protocols in terms of efficiency and security.
作者: 易受刺激    時(shí)間: 2025-3-29 12:02

作者: 可互換    時(shí)間: 2025-3-29 19:24
0302-9743 ckchain; Cryptography; Security with AI and Machine Learning; IoT Security; Hardware Security; and Selected Security Issues..978-3-030-39302-1978-3-030-39303-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 背景    時(shí)間: 2025-3-29 21:06

作者: uncertain    時(shí)間: 2025-3-30 02:52
Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessingg before data embedding. Compared with the state-of-the-art methods, higher embedding capacity can be obtained with the proposed method while the original or processed image can be correctly generated.
作者: 里程碑    時(shí)間: 2025-3-30 05:19
Model Selection for Data Analysis in Encrypted Domain: Application to?Simple Linear Regressionng 4-fold cross validation, 4 different estimates of our model’s errors are calculated. And then we use bias and variance extracted from these errors to find the best model. We perform an experiment on a dataset extracted from Kaggle and show that our approach can homomorphically regress a given encrypted data without decrypting it.
作者: stratum-corneum    時(shí)間: 2025-3-30 11:22
QR Code Watermarking for Digital Imagesatermarking technique for digital images using QR codes. The advantage of using QR codes for watermarking is that properties of the QR code structure include error correction and high data capacity. This paper proposes a QR code watermarking technique, and examines its robustness and security against common digital image attacks.
作者: MOT    時(shí)間: 2025-3-30 12:42

作者: 草率女    時(shí)間: 2025-3-30 18:23
Timed-Release Encryption with Master Time Bound Key this problem in this paper by having a master time bound key which can replace the time bound key of any release time. We first present security models of the timed-release encryption with master time bound key. We present a provably secure construction based on the Weil pairing.
作者: AUGER    時(shí)間: 2025-3-30 20:42
0302-9743 ications, WISA 2019, held on Jeju Island, South Korea, in August 2019. The 29 revised full papers presented in this volume were carefully reviewed and selected from 63 submissions...The primary focus of WISA 2019 was on systems and network security including all other technical and practical aspects
作者: 間諜活動(dòng)    時(shí)間: 2025-3-31 02:28

作者: squander    時(shí)間: 2025-3-31 08:58

作者: Obscure    時(shí)間: 2025-3-31 11:01

作者: 生氣的邊緣    時(shí)間: 2025-3-31 13:50

作者: 向下五度才偏    時(shí)間: 2025-3-31 18:58





歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
神农架林区| 景德镇市| 临汾市| 称多县| 开鲁县| 保康县| 廊坊市| 宁津县| 宝坻区| 塘沽区| 株洲县| 宜兰市| 崇州市| 乡宁县| 株洲县| 康定县| 安国市| 青岛市| 麻城市| 临朐县| 蒙自县| 灌南县| 同心县| 镇赉县| 金川县| 呈贡县| 泾源县| 攀枝花市| 治多县| 旬邑县| 沧源| 天气| 杭锦后旗| 青浦区| 崇州市| 连城县| 江北区| 阳谷县| 成武县| 安乡县| 绥中县|