派博傳思國際中心

標題: Titlebook: Information Security Applications; 18th International C Brent ByungHoon Kang,Taesoo Kim Conference proceedings 2018 Springer International [打印本頁]

作者: CK828    時間: 2025-3-21 16:04
書目名稱Information Security Applications影響因子(影響力)




書目名稱Information Security Applications影響因子(影響力)學科排名




書目名稱Information Security Applications網絡公開度




書目名稱Information Security Applications網絡公開度學科排名




書目名稱Information Security Applications被引頻次




書目名稱Information Security Applications被引頻次學科排名




書目名稱Information Security Applications年度引用




書目名稱Information Security Applications年度引用學科排名




書目名稱Information Security Applications讀者反饋




書目名稱Information Security Applications讀者反饋學科排名





作者: 走路左晃右晃    時間: 2025-3-21 21:34

作者: figure    時間: 2025-3-22 00:35

作者: 可憎    時間: 2025-3-22 07:01
Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy, Revisited ARM–NEON, INTEL–SSE, INTEL–AVX2). The methods achieved the fault attack resistance with intra-instruction redundancy feature in SIMD instruction set. Finally, we applied the new fault attack countermeasures on the block cipher LEA and achieved the intra-instruction redundancy and high performance over modern ARM-NEON architectures.
作者: obstinate    時間: 2025-3-22 09:38

作者: 彩色    時間: 2025-3-22 16:08
O,TR: Offline Off-the-Record (OTR) Messagingotype to support O.TR based on the Gajim XMMP instant messaging platform. Our experiments showed that O.TR can reliably be used when a network party is broken down. Moreover, O.TR provides an efficient session refreshment which is about . faster than the original OTR.
作者: 磨碎    時間: 2025-3-22 17:29
Evolution of Spamming Attacks on Facebookmessenger. We study such the advanced spamming campaign so as to demystify how it has been worked and settled down on Facebook ecosystem. We build a crawler and analyser which collect 0.6 million of comments; afterwards, extracts the targeted spams. Our data shows that the spams are systematic, well-structured, obfuscated and even localized.
作者: frenzy    時間: 2025-3-22 23:51

作者: invade    時間: 2025-3-23 01:24
Glitch Recall: A Hardware Trojan Exploiting Natural Glitches in Logic Circuitsversary who triggered the hardware Trojan may infer multiple input values from a single output of the target logic, thereby obtaining multiple outputs of the preceding logics, by monitoring the existence of the natural glitches. We perform experiments and discuss the results and threats, not to be neglected, along with a possible mitigation.
作者: Creatinine-Test    時間: 2025-3-23 06:53
Robust 3D Mesh Watermarking Scheme for an Anti-Collusion Fingerprint Codethe response of the detector and herein present optimized thresholds for our method. Based on the experiments, the proposed method outperformed conventional robust mesh watermarking against collusion attack in all cases.
作者: HAUNT    時間: 2025-3-23 12:15

作者: Seizure    時間: 2025-3-23 17:23

作者: Admire    時間: 2025-3-23 21:23
0302-9743 and emerging technologies; systems security?and authentication; crypto protocols; and attack detections and legal aspects..978-3-319-93562-1978-3-319-93563-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 滔滔不絕地講    時間: 2025-3-24 02:03

作者: 廢止    時間: 2025-3-24 06:02
Breaking Text CAPTCHA by Repeated InformationHA image when joining a cafe group, but this CAPTCHA is structured in a very regular format which can be read very simply if used repeatedly. We can read the text characters by bot with very high accuracy through some easy steps, among 2,000 sample CAPTHCAs.
作者: 分發(fā)    時間: 2025-3-24 08:36

作者: 有害處    時間: 2025-3-24 10:57
0302-9743 cations,?WISA 2017, held on Jeju Island, Korea, in August 2017..The 12 revised full papers and 15 short papers presented in this?volume were carefully reviewed and selected from 53 submissions. The?papers are organized in topical sections such as attack and defense;?theory in security; web security
作者: infinite    時間: 2025-3-24 15:45
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465297.jpg
作者: Neuropeptides    時間: 2025-3-24 21:26

作者: 河潭    時間: 2025-3-25 01:54

作者: Crohns-disease    時間: 2025-3-25 07:21
https://doi.org/10.1007/978-3-319-93563-8Analysis of network and security protocol; Authentication and authorization; Botnet defense; Critical i
作者: 波動    時間: 2025-3-25 09:24
f applications related to financial products whose value is Mathematical finance and financial engineering have been rapidly expanding fields of science over the past three decades. The main reason behind this phenomenon has been the success of sophisticated quantitative methodolo- gies in helping p
作者: detach    時間: 2025-3-25 14:43
dramatically. One consequence of this development is a paradigm shift in the way organizations manage their relationships with individuals. At one time, when dealing with large populations, standard practice was to segment people into relatively few groups, and then apply identical relationship man
作者: A精確的    時間: 2025-3-25 19:54

作者: mitten    時間: 2025-3-25 21:02

作者: 擴張    時間: 2025-3-26 03:35

作者: Mri485    時間: 2025-3-26 04:54
parameter estimation or modelling. Many different methods of model construction exist, and there are many theoretical arguments why one method is better than another, or why such and such a method is/is not appropriate in a given set of circumstances. However, for predictive modelling the method use
作者: Biomarker    時間: 2025-3-26 10:54
Haoyu Li,Yanbin Pan which firms will default and which will not, so assessments can only be made on the likelihood of default. As a consequence, firms generally pay a spread over the default-free rate of interest that is proportional to their default probability to compensate lenders for this uncertainty. Default is a
作者: fallible    時間: 2025-3-26 13:47

作者: 斜谷    時間: 2025-3-26 17:03
Mahdi Daghmehchi Firoozjaei,Sang Min Lee,Hyoungshick Kime businesspeople who attempted to make a living in a period of commercial challenges. Inconvenient though it is for historians eager to model the vagaries of the later medieval economy, we need to always be mindful that it was the business decisions of individuals that shaped the aggregate trend lin
作者: adulterant    時間: 2025-3-26 22:24
Hwajeong Seo,Taehwan Park,Janghyun Ji,Zhi Hu,Howon Kimater medieval England. She describes London’s unique position in the later Middle Ages as follows: ‘By the early fourteenth century London was pre-eminent among English urban communities. Whether ranked according to wealth or according to population, its pre-eminence was undisputed. Although London
作者: 蒸發(fā)    時間: 2025-3-27 01:10

作者: 把…比做    時間: 2025-3-27 06:01

作者: 使無效    時間: 2025-3-27 13:00

作者: 威脅你    時間: 2025-3-27 15:23

作者: 現(xiàn)任者    時間: 2025-3-27 17:54

作者: Genistein    時間: 2025-3-28 01:49
Jae Hyeon Woo,Moosung Park,Kyungho Leesions. Regulators, in a slightly alternative context, perform a similar task. They face, however, a rather different set of constraints and objectives. Regulators, in fact, use standardized models to promote fairness, a level playing field, monitor the solvency of individual entities, and enhance ov
作者: Pepsin    時間: 2025-3-28 05:48
Jonathan Grimm,Irfan Ahmed,Vassil Roussev,Manish Bhatt,ManPyo Hongdent Bernoulli trials, a binomial default-loss distribution emerges. A critical assumption of this introductory approach, however, is statistical independence between the default of various obligors in one’s portfolio. While of great mathematical convenience, this is an indefensible supposition. Not
作者: acrobat    時間: 2025-3-28 09:45

作者: Initiative    時間: 2025-3-28 13:34
Kwon-Jin Yoon,Jaehyeon Yoon,Souhwan Jungwhen a sustained load is applied. It is important to understand the mechanisms as this will pave the way for improvements that can be made to reduce this creep and will also assist in creating prediction models as it will be based on the fundamental mechanisms involved. This paper presents results o
作者: Outwit    時間: 2025-3-28 18:35
Momoka Kasuya,Kazuo Sakiyamabehaviour of cracked fibre reinforced concrete under sustained load, investigating statically determinate and indeterminate test setups, fibre type (steel and polymer macro fibres) and fibre dosage. The duration of the creep tests ranges from less than 1 to 14?years. The following observations were
作者: FLAX    時間: 2025-3-28 21:49
Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy, Revisitedh the communication is securely encrypted, the system can be exploited by malicious users if the attackers inject fault signal to the system and extract the user’s secret information. For this reason, we need to ensure the high performance encryption together with secure countermeasures against side
作者: escalate    時間: 2025-3-28 23:54
Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networksmework to detect the manipulation of images through a contextual violation. First, we proposed a context learning convolutional neural networks (CL-CNN) that detects the contextual violation in the image. In combination with a well-known object detector such as R-CNN, the proposed method can evaluat
作者: Neuralgia    時間: 2025-3-29 06:11
Robust 3D Mesh Watermarking Scheme for an Anti-Collusion Fingerprint Codecheme for an anti-collusion code. In contrast to the existing robust mesh watermarking which provides unsuitable primitives for anti-collusion code, the proposed method has well-operated capacity to carry the anti-collusion fingerprint code. In order to minimize the detection error, we also modeled
作者: Vasodilation    時間: 2025-3-29 09:36

作者: VICT    時間: 2025-3-29 11:49

作者: ABIDE    時間: 2025-3-29 17:30
O,TR: Offline Off-the-Record (OTR) Messagingt applicable in some practical scenarios (e.g., when communication network became disconnected) because OTR requires both parties to be online at the same time. To address this limitation, we extend the conventional OTR into a new protocol named offline OTR (O.TR). O.TR makes the conversation partie
作者: Contend    時間: 2025-3-29 20:33
ARM/NEON Co-design of Multiplication/Squaringn SISD are accelerated by re-writing the previous implementations in SIMD instruction sets. Particularly, integer multiplication and squaring operations are the most expensive in Public Key Cryptography (PKC). Many works have been conducted to reduce the execution timing in NEON instruction set. How
作者: Mosaic    時間: 2025-3-30 02:21

作者: PHAG    時間: 2025-3-30 04:35
Evolution of Spamming Attacks on Facebookrvice, over the past decades. Whereas, we have still been suffering from the attack though the service vendors as well as academia have been making best effort on winning such arms race. Such being the case, Facebook have also been inevitable to confront spamming campaign in order not to be overwhel
作者: nominal    時間: 2025-3-30 10:15
Model Parameter Estimation and Inference on Encrypted Domain: Application to Noise Reduction in Encr regarded as a way to maintain user privacy on the untrusted cloud. However, HE is not widely used in machine learning and signal processing communities because the HE libraries are currently supporting only simple operations like integer addition and multiplication. It is known that division and ot
作者: 教義    時間: 2025-3-30 15:08
Breaking Text CAPTCHA by Repeated Informationor choose some images from the provider’s choice. . portal site, which is one of the most famous web portal site in Korea, asks text response in CAPTCHA image when joining a cafe group, but this CAPTCHA is structured in a very regular format which can be read very simply if used repeatedly. We can r
作者: Arb853    時間: 2025-3-30 19:41

作者: HEAVY    時間: 2025-3-30 23:41
Glitch Recall: A Hardware Trojan Exploiting Natural Glitches in Logic CircuitsTo avoid a detection mechanism, hardware Trojans may need a stealthy nature in their existence for being dormant, and even when triggered. In this paper, we devise a new hardware Trojan concept that exploits natural glitches and their control mechanisms for information leakage in a stealthy manner.
作者: FIN    時間: 2025-3-31 02:09

作者: 自負的人    時間: 2025-3-31 05:34

作者: 無王時期,    時間: 2025-3-31 11:52

作者: Cuisine    時間: 2025-3-31 16:26
Jungwoo Joh,Yezee Seo,Hoon-Kyu Kim,Taekyoung Kwoncial forms of credit business to statistical calibrations and practical implementations. This unique and timely book constitutes an indispensable tool for both practitioners and academics working in the evaluation of credit risk..978-3-642-05854-7978-3-662-06427-6Series ISSN 1616-0533 Series E-ISSN 2195-0687




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
广东省| 庆云县| 靖边县| 泾源县| 外汇| 嵊州市| 康马县| 香港 | 个旧市| 陕西省| 彭州市| 富裕县| 应用必备| 宁城县| 吴桥县| 柯坪县| 大悟县| 阜平县| 翁源县| 会东县| 漳平市| 原阳县| 马关县| 塔河县| 谢通门县| 黄石市| 尼玛县| 读书| 霍邱县| 台中县| 亳州市| 黄浦区| 乡宁县| 平邑县| 绥宁县| 蒲江县| 乌鲁木齐县| 平利县| 田东县| 樟树市| 五华县|