標(biāo)題: Titlebook: Information Systems Security; 9th International Co Aditya Bagchi,Indrakshi Ray Conference proceedings 2013 Springer-Verlag Berlin Heidelber [打印本頁(yè)] 作者: 游牧 時(shí)間: 2025-3-21 17:31
書(shū)目名稱(chēng)Information Systems Security影響因子(影響力)
書(shū)目名稱(chēng)Information Systems Security影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Information Systems Security網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Information Systems Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Information Systems Security被引頻次
書(shū)目名稱(chēng)Information Systems Security被引頻次學(xué)科排名
書(shū)目名稱(chēng)Information Systems Security年度引用
書(shū)目名稱(chēng)Information Systems Security年度引用學(xué)科排名
書(shū)目名稱(chēng)Information Systems Security讀者反饋
書(shū)目名稱(chēng)Information Systems Security讀者反饋學(xué)科排名
作者: 是比賽 時(shí)間: 2025-3-22 00:11
Signcryption from Randomness Recoverable PKE Revisited, class of encryption and signature schemes. The proposed construction achieves multi-user insider security for confidentiality in random oracle model and authenticity in standard model. It is done by incorporating one extra hashing in both signcryption and unsigncryption phases than the original construction.作者: 禁令 時(shí)間: 2025-3-22 03:54 作者: 不能約 時(shí)間: 2025-3-22 08:11
0302-9743 rnational Conference on Information Systems Security, ICISS 2013, held in Kolkata, India, in December 2013. The 20 revised full papers and 6 short papers presented together with 3 invited papers were carefully reviewed and selected from 82 submissions. The papers address theoretical and practical pr作者: prosperity 時(shí)間: 2025-3-22 11:30
A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Eservice interactions or that may have been exchanged between organizations thereafter. The framework can infer relevant privacy properties from these profiles. To validate our work, the approach is applied to the modeling of a web shop.作者: 空洞 時(shí)間: 2025-3-22 15:21
Secure States , Secure Executions,t permits to make the bridge between the definition of secure states and security properties over sequences of secure states corresponding to executions. Along the lines of this paper, we illustrate our definitions by considering access control policies defined as properties over states and flow properties over executions of a system.作者: 變色龍 時(shí)間: 2025-3-22 17:53 作者: mechanical 時(shí)間: 2025-3-22 22:16
Auctions with Rational Adversary,lves as well as the rational adversary; 2) prevention of ‘throwing away’ of contracts by rational adversaries and 3) prevention of sellers from obtaining their copy of the contract while winners do not receive theirs.作者: pulmonary 時(shí)間: 2025-3-23 01:25 作者: Neuropeptides 時(shí)間: 2025-3-23 06:14 作者: Strength 時(shí)間: 2025-3-23 12:02
Challenges and Opportunities for Security with Differential Privacy,ndently meeting the requirements of secure multiparty computation and differential privacy does not result in a solution meeting the real goals of privacy and security. Through this, we outline challenges and opportunities for further research.作者: 館長(zhǎng) 時(shí)間: 2025-3-23 15:38
Monitoring for Slow Suspicious Activities Using a Target Centric Approach,ingle profile score. The main contribution of the paper is proposing a radical shift to the focus of analysis. Experimental results offer a promise for target centric monitoring that does not have to rely on possible source aggregation.作者: conscience 時(shí)間: 2025-3-23 20:21 作者: TAIN 時(shí)間: 2025-3-24 00:05 作者: 蕨類(lèi) 時(shí)間: 2025-3-24 02:59 作者: 停止償付 時(shí)間: 2025-3-24 07:03 作者: Stress-Fracture 時(shí)間: 2025-3-24 14:32
Information Systems Security978-3-642-45204-8Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Directed 時(shí)間: 2025-3-24 16:42 作者: 孤獨(dú)無(wú)助 時(shí)間: 2025-3-24 19:56 作者: infatuation 時(shí)間: 2025-3-24 23:46
ural heritage tourism at undesignated sites, and the cultural politics of museums and collections. Something of a cultural heritage designation craze is happening in China. This is new within even the last five to ten years. Officials at many levels now see heritage preservation as a means for commo作者: CLAN 時(shí)間: 2025-3-25 04:17 作者: membrane 時(shí)間: 2025-3-25 10:43
Florian Kerschbaum,Martin H?rterich,Mathias Kohler,Isabelle Hang,Andreas Schaad,Axel Schr?pfer,Walteurban environments to ethnic tourism, to underwater material?This volume explores China’s cultural heritage ideology and policies from three interrelated perspectives: the State and World Heritage tourism; cultural heritage tourism at undesignated sites, and the cultural politics of museums and coll作者: Flirtatious 時(shí)間: 2025-3-25 14:41
Kerim Yasin Oktay,Vaibhav Khadilkar,Murat Kantarcioglu,Sharad Mehrotraural heritage tourism at undesignated sites, and the cultural politics of museums and collections. Something of a cultural heritage designation craze is happening in China. This is new within even the last five to ten years. Officials at many levels now see heritage preservation as a means for commo作者: kindred 時(shí)間: 2025-3-25 19:41 作者: 常到 時(shí)間: 2025-3-25 22:50
Ankita Chaturvedi,Dheerendra Mishra,Sourav Mukhopadhyayare therefore subject to the chemical action of atmospheric constituents. This gives rise to transformations in the materials, changing their chemical composition, and their physical and mechanical characteristics. Atmospheric pollution, i.e. the phenomenon that changes the natural atmospheric compo作者: 聯(lián)想 時(shí)間: 2025-3-26 02:48 作者: Oscillate 時(shí)間: 2025-3-26 08:16
Sourya Joyee De,Asim K. Palare therefore subject to the chemical action of atmospheric constituents. This gives rise to transformations in the materials, changing their chemical composition, and their physical and mechanical characteristics. Atmospheric pollution, i.e. the phenomenon that changes the natural atmospheric compo作者: 異常 時(shí)間: 2025-3-26 08:58
Koen Decroix,Jorn Lapon,Bart De Decker,Vincent Naessensare therefore subject to the chemical action of atmospheric constituents. This gives rise to transformations in the materials, changing their chemical composition, and their physical and mechanical characteristics. Atmospheric pollution, i.e. the phenomenon that changes the natural atmospheric compo作者: Fortuitous 時(shí)間: 2025-3-26 12:58
Ganugula Umadevi,Ashutosh Saxenag systems and on the environment. This term was used for the first time in 1935, but the attention of scientists to the biological component of the atmosphere goes back to 1769, when the Italian biologist Spallanzani carried out a series of experiments that disproved the concept of spontaneous gener作者: 對(duì)手 時(shí)間: 2025-3-26 18:22
Safaà Hachana,Frédéric Cuppens,Nora Cuppens-Boulahia,Vijay Atluri,Stephane Morucciare therefore subject to the chemical action of atmospheric constituents. This gives rise to transformations in the materials, changing their chemical composition, and their physical and mechanical characteristics. Atmospheric pollution, i.e. the phenomenon that changes the natural atmospheric compo作者: 喧鬧 時(shí)間: 2025-3-26 22:27 作者: 不適 時(shí)間: 2025-3-27 04:57
Harsha K. Kalutarage,Siraj A. Shaikh,Qin Zhou,Anne E. Jamesdly globalizing postcolonial countries appear on the map symbolized by flags, national anthems, state flowers, and ancient monuments (Barkan and Bush 2003; Kohl 1998). But when heritage and national identity become synonymous with prominent cultural resources, politically motivated destructive impul作者: 我的巨大 時(shí)間: 2025-3-27 05:48
Ayesha Khalid,Muhammad Hassan,Anupam Chattopadhyay,Goutam Paul., its great load of unrepented cruelty and unshared sorrow. . . . Can Delhi’s accumulated offences be washed away? Can some atonement or penance – or some God-sent blessing or grace – expiate the guilt of centuries, and generate a breeze of forgiveness that blows away the smells of torture and reve作者: 串通 時(shí)間: 2025-3-27 11:12
Naveen Kumar,Anish Mathuria,Manik Lal Dasltural heritage will find this and subsequent volumes of int.In today’s world, there seems to be no corner of the world that has not been affected by globalization – for good and for bad. While the world becomes more hegemonized socially and culturally, local communities are fighting to preserve the作者: 方便 時(shí)間: 2025-3-27 14:46 作者: 的染料 時(shí)間: 2025-3-27 18:05 作者: 聯(lián)邦 時(shí)間: 2025-3-28 00:37
Risk Aware Approach to Data Confidentiality in Cloud Computing,tiple manifestations, we focus on the data privacy and confidentiality implications when cloud providers are untrusted. Instead of following the well studied (but still unsolved) path of encrypting data when outsourcing and computing on the encrypted domain, the paper advocates a risk-based approach作者: exophthalmos 時(shí)間: 2025-3-28 03:50
Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach,ing combinatorial designs for alleviating jamming attacks. One of these protocols is for unicast communication model and the other is aimed for multicast communication model. To the best of our knowledge, this is the first paper which uses combinatorial designs as a tool to solve the anti-jamming co作者: 莎草 時(shí)間: 2025-3-28 06:25 作者: mosque 時(shí)間: 2025-3-28 12:22
Signcryption from Randomness Recoverable PKE Revisited,i & Wong’ construction [Information Sciences 180 (2010)] to achieve better security from weaker building blocks and thereby making it open to a larger class of encryption and signature schemes. The proposed construction achieves multi-user insider security for confidentiality in random oracle model 作者: 關(guān)心 時(shí)間: 2025-3-28 18:33 作者: 反對(duì) 時(shí)間: 2025-3-28 19:14
A Framework for Formal Reasoning about Privacy Properties Based on Trust Relationships in Complex Eallows for formally modeling these services in a typed first-order logic and for inferring privacy properties that can be interpreted by all the stakeholders including consumers. The inference strategy consists of compiling user profiles according to the expectations of the consumer about the data p作者: deficiency 時(shí)間: 2025-3-29 02:41 作者: 結(jié)合 時(shí)間: 2025-3-29 04:47
Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management, has become a paramount necessity. Still, the management of manually configured firewall rules is complex, error prone, and costly for large networks. The use of high abstract models such as role based access control RBAC has proved to be very efficient in the definition and management of access con作者: CRAFT 時(shí)間: 2025-3-29 09:25 作者: sulcus 時(shí)間: 2025-3-29 12:11
Monitoring for Slow Suspicious Activities Using a Target Centric Approach, collusion and source address spoofing are common. Effective attribution of attacks therefore is a real challenge. To address this we propose an approach to utilise destination information of activities together with a data fusion technique to combine the output of several information sources to a s作者: forebear 時(shí)間: 2025-3-29 16:31
RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers, (SPN) based symmetric ciphers. The framework tries to bridge the gap between the designer of cryptographic schemes and the VLSI implementation engineers of that cryptographic systems. Using a GUI-based interface the user has the freedom either to choose a well-known Feistel or SPN based cryptosyste作者: 保全 時(shí)間: 2025-3-29 21:16
Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach, session making it infeasible for the adversary to anticipate the common channel to be used by a particular pair of nodes. We show these protocols using combinatorial designs performs better than existing anti-jamming protocol.作者: 類(lèi)似思想 時(shí)間: 2025-3-30 02:26
Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Sm-factor remote user authentication and also fails to satisfy key security attributes. Further, the article presents an improved anonymous authentication scheme which eliminates all the drawbacks of An’s and Li et al.’s scheme. Moreover, proposed scheme presents efficient login and password change me作者: Pessary 時(shí)間: 2025-3-30 06:48
Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management,n this paper, we propose an extension of role mining techniques to facilitate the adoption of a model based framework in the management of network access control. We present policy mining, a bottom-up approach that extracts instances of the NS-RBAC model from the deployed rules on a firewall. We pro作者: 灰姑娘 時(shí)間: 2025-3-30 12:12
RAPID-FeinSPN: A Rapid Prototyping Framework for Feistel and SPN-Based Block Ciphers,arking various design parameters of a cipher that vary in terms of security, complexity or both for a security-throughput trade-off. We have implemented some well known block ciphers using RAPID-FeinSPN and benchmarked the performance against software as well as hardware implementations.作者: 背信 時(shí)間: 2025-3-30 13:31 作者: 恩惠 時(shí)間: 2025-3-30 18:45
Florian Kerschbaum,Martin H?rterich,Mathias Kohler,Isabelle Hang,Andreas Schaad,Axel Schr?pfer,Walte development, museums, border heritage, underwater remains, and the actual governance and management of the sites. This volume?is an outstanding introduction to cultural heritage issues in China while contribut978-1-4899-9761-6978-1-4614-6874-5