派博傳思國(guó)際中心

標(biāo)題: Titlebook: Secure IT Systems; 23rd Nordic Conferen Nils Gruschka Conference proceedings 2018 Springer Nature Switzerland AG 2018 authentication.comput [打印本頁(yè)]

作者: CLIP    時(shí)間: 2025-3-21 19:25
書目名稱Secure IT Systems影響因子(影響力)




書目名稱Secure IT Systems影響因子(影響力)學(xué)科排名




書目名稱Secure IT Systems網(wǎng)絡(luò)公開度




書目名稱Secure IT Systems網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Secure IT Systems被引頻次




書目名稱Secure IT Systems被引頻次學(xué)科排名




書目名稱Secure IT Systems年度引用




書目名稱Secure IT Systems年度引用學(xué)科排名




書目名稱Secure IT Systems讀者反饋




書目名稱Secure IT Systems讀者反饋學(xué)科排名





作者: facetious    時(shí)間: 2025-3-21 20:25
in this chapter, a hybrid combination of the wavelet transforms have been discussed for single and multiple image watermarking. The transforms, combined in this chapter, are nonsubsampled contourlet transform (NSCT), discrete cosine transform (DCT) and multiresolution singular value decomposition?(
作者: Anthem    時(shí)間: 2025-3-22 00:51
George Te?eleanuapplication of a standard to describe the learning objects (LO). The authoring of LO corresponds to one major maintenance costs present in these applications. PCMAT is able to generate several instances of the same learning object through the parameterization of some features of the learning object.
作者: surmount    時(shí)間: 2025-3-22 06:07

作者: 舉止粗野的人    時(shí)間: 2025-3-22 10:24
Arash Atashpendar,G. Vamsi Policharla,Peter B. R?nne,Peter Y. A. Ryann animated intelligent agent. The affective behavior model maintains an intelligent representation of the student’s affect state to adapt the instruction by means of a dynamic Bayesian network (DBN). The affect diagnosis is based on the Cognitive Model of Emotions (CME) and on the five-factor model
作者: 言行自由    時(shí)間: 2025-3-22 14:43

作者: 實(shí)施生效    時(shí)間: 2025-3-22 19:21
Ahto Buldas,Risto Laanoja,Ahto Truuped an approach based on E-Learning standards. Our approach is also grounded in a very well known paradigm for implementing ITS, and the main goal of this chapter is to present a novel approach for implementing ITS as learning objects using the Sharable Content Object Reference Model (SCORM).
作者: Constituent    時(shí)間: 2025-3-22 21:50

作者: 清楚說(shuō)話    時(shí)間: 2025-3-23 02:11
Rasmus Dahlberg,Tobias Pullsndom images with well-defined artworks and give it an artistic look that can further be used for different purposes. This deep analysis of images and its information is done by using CNN, and it portrays their capability of high-level image synthesis and image manipulation. The intermediate results
作者: Alopecia-Areata    時(shí)間: 2025-3-23 07:14
g motion detectors after every alternate pole, we have used a single motion detector after every intersection or crossing. Now on highways, the vehicles must keep up to a minimum speed. We set up the street lights according to this minimum speed. Then with this data, along with the range of the dete
作者: Arthr-    時(shí)間: 2025-3-23 12:27
Charalampos Stylianopoulos,Linus Johansson,Oskar Olsson,Magnus Almgren the real-time data on crop water demand, irrigation schedule, and groundwater discharge and recharge were developed, the system will help in maintaining the groundwater reservoirs and reduce electrical power consumption with added advantages of open-source data availability, data cleaning, and visu
作者: 描述    時(shí)間: 2025-3-23 17:28

作者: concubine    時(shí)間: 2025-3-23 20:13
Vivien M. Rooney,Simon N. Foleyus of vehicular sensor information is transmitted using a vehicular cloud. In the soft fault diagnosis, the permanent soft fault is detected using a comparative-based approach. The validation of the proposed approach is carried out by two performance metrics.
作者: output    時(shí)間: 2025-3-24 00:35

作者: Vital-Signs    時(shí)間: 2025-3-24 04:04
Stewart Sentanoe,Benjamin Taubmann,Hans P. Reisered technique applying on both ELM and BPNN is also considered for experimentation. The simulated result depicted the outstanding performance of the proposed ELM-elitism-based self-adaptive multi-population Jaya model over ELM, BPNN, ELM-Jaya, and BPNN-Jaya.
作者: Texture    時(shí)間: 2025-3-24 07:23

作者: meritorious    時(shí)間: 2025-3-24 14:02
MixMesh Zones – Changing Pseudonyms Using Device-to-Device Communication in Mix Zonesable to deliver better anonymity at an unchanged level of service quality compared to existing mix zone techniques, all the while being configurable to a desired level of anonymity in order to adapt to different scenarios.
作者: paradigm    時(shí)間: 2025-3-24 16:51

作者: BALE    時(shí)間: 2025-3-24 22:33
On Security Analysis of Generic Dynamic Authenticated Group Key Exchangermation called as a compiler. A new signature-based protocol compiler is proposed for building secure generic dynamic AGKE. Specifically, the compiler takes as input a passively forward secure GKE protocol and a secure signature scheme, and output a secure AGKE protocol without any modification on t
作者: 啟發(fā)    時(shí)間: 2025-3-25 02:04
The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants comprehensively, we formalize linear identification schemes, show that many schemes in the literature are linear, and show that any linear scheme meets our conditions for the signature schemes given by the three transforms to have equivalent uf-security. Our results give a comprehensive picture of
作者: 咒語(yǔ)    時(shí)間: 2025-3-25 03:53
: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUsan open issue, it has the promise to run NIDS more efficiently..In this work we introduce ., an extension to the well-known NIDS Snort that (a)?is designed for IoT devices (b)?alleviates the burden of pattern matching for intrusion detection by offloading it to the GPU. We thoroughly explain how our
作者: jealousy    時(shí)間: 2025-3-25 07:53

作者: manifestation    時(shí)間: 2025-3-25 14:27

作者: 顛簸下上    時(shí)間: 2025-3-25 17:19
Steadymentation (.2,200 loc) shows reliable goodput of over 1M events/s (.160 MiB/s) for a realistic dataset with commodity hardware for a device on a GigE network using 16 MiB of memory connected to a relay running at Amazon EC2.
作者: engrave    時(shí)間: 2025-3-25 21:05
Detection of Covert Channels in TCP Retransmissionsonsidered a promising detection method for retransmission-based covert channels while the compressibility itself provides insufficient results but could potentially be used as a classification feature.
作者: 夾克怕包裹    時(shí)間: 2025-3-26 02:47
What You Can Change and What You Can’t: Human Experience in Computer Network Defensesdentity Theory, Relational Dialectics, and Cognitive Dissonance, provide a way of understanding and interpreting these components of Computer Network Defence work, and can be used to assess the experience of staff.
作者: Alveolar-Bone    時(shí)間: 2025-3-26 05:42
Privacy-Preserving Distributed Economic Dispatch Protocol for Smart Grid all generator nodes that meet the demand of the customers at minimum operating cost. In recent years, distributed protocols have been proposed to replace the traditional centralized ED calculation for modern smart grid infrastructures with the most realistic being the one proposed by Binetti . (201
作者: Expertise    時(shí)間: 2025-3-26 10:21
Tracking Information Flow via Delayed OutputT apps and email marketing. We discuss the threat of privacy leaks via delayed output in code published by malicious app makers on popular IoT app platforms. We discuss the threat of privacy leaks via delayed output in non-malicious code on popular platforms for email-driven marketing. We present se
作者: 事情    時(shí)間: 2025-3-26 13:12

作者: amorphous    時(shí)間: 2025-3-26 17:50
AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applicationsrther complicates the problem and renders many existing analysis tools incapacitated. In this paper, we propose AppLance, a novel lightweight analysis system for Android packed applications without prior unpacking, which can also consider implicit information flow and privacy confusion. Without modi
作者: exceptional    時(shí)間: 2025-3-26 23:59
Unifying Kleptographic Attacks can replace individual backdoors embedded into protocols for proving knowledge of a discrete logarithm (. the Schnorr and Girault protocols), protocols for proving knowledge of an .-root (. the Fiat-Shamir and Guillou-Quisquater protocols), protocols for proving knowledge of a discrete logarithm re
作者: Pituitary-Gland    時(shí)間: 2025-3-27 03:30

作者: 木訥    時(shí)間: 2025-3-27 08:40
Revisiting Deniability in Quantum Key Exchanged Beaver, it is argued that QKE is not necessarily deniable due to an eavesdropping attack that limits key equivocation. We provide more insight into the nature of this attack and how it extends to other constructions such as QKE obtained from uncloneable encryption. We then adopt the framework for
作者: travail    時(shí)間: 2025-3-27 09:31
On Security Analysis of Generic Dynamic Authenticated Group Key Exchange Dynamic AGKE allows for very efficient group membership changes (join, leave, merge and partition, etc.) during protocol executions. In this paper, a security model is developed for generic dynamic AGKE to cover more active attacks than previous similar models (such as leakage of ephemeral secret k
作者: 聯(lián)想    時(shí)間: 2025-3-27 14:21
A Blockchain-Assisted Hash-Based Signature Scheme model somewhat. We postulate a set of design requirements, discuss some approaches and their practicality, and finally reach a forward-secure scheme with only modest trust assumptions, achieved by employing the concepts of . and .. The concepts of blockchain authenticated data structures and the pr
作者: 有助于    時(shí)間: 2025-3-27 21:16
The Fiat-Shamir Zoo: Relating the Security of Different Signature Variantsetimes to one variant, sometimes to another. We systematically study three variants that we call the challenge (signature is challenge and response), commit (signature is commitment and response), and transcript (signature is challenge, commitment and response) variants. Our framework captures the v
作者: 客觀    時(shí)間: 2025-3-28 00:53
Verifiable Light-Weight Monitoring for Certificate Transparency Logsor is to observe each and every log entry, looking for suspicious certificates that interest the entity running the monitor. While anyone can run a monitor, it requires continuous operation and copies of the logs to be inspected. This has lead to the emergence of monitoring as-a-service: a trusted t
作者: Lament    時(shí)間: 2025-3-28 04:46

作者: 確定無(wú)疑    時(shí)間: 2025-3-28 09:38

作者: 同來(lái)核對(duì)    時(shí)間: 2025-3-28 13:38
What You Can Change and What You Can’t: Human Experience in Computer Network Defenses alone on technology, but also on people. Understanding how people experience these environments is an essential component toward achieving optimal functioning. This paper describes a qualitative research study on the human experience of working in these environments. Using Grounded Theory, a psycho
作者: GREG    時(shí)間: 2025-3-28 18:13

作者: tic-douloureux    時(shí)間: 2025-3-28 21:40
: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspectionploited using brute-force attacks. To learn more about adversaries, we can use a honeypot that provides information about attack and exploitation methods. The problem of current honeypot implementations is that attackers can easily detect that they are interacting with a honeypot and stop their acti
作者: Cursory    時(shí)間: 2025-3-28 23:14
0302-9743 vember 2018..The 29 full papers presented in this volume were carefully reviewed and selected from 81 submissions. They are organized in topical sections named: privacy; cryptography; network and cloud security; cyber security and malware; and security for software and software development...?.978-3
作者: TERRA    時(shí)間: 2025-3-29 04:01
Tracking Information Flow via Delayed OutputWe develop two security type systems: for information flow control in potentially malicious code and for taint tracking in non-malicious code, engaging . and . security types to soundly enforce projected noninterference and projected weak secrecy.
作者: Embolic-Stroke    時(shí)間: 2025-3-29 09:06

作者: 禍害隱伏    時(shí)間: 2025-3-29 13:15
Verifiable Light-Weight Monitoring for Certificate Transparency Logsthat enables subjects to verify the correctness of such certificate notifications, making it easier to distribute and reduce the trust which is otherwise placed in these monitors. Our extension supports verifiable monitoring of wild-card domains and piggybacks on CT’s existing gossip-audit security model.
作者: SHOCK    時(shí)間: 2025-3-29 18:31
: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspectionintroduce ., a virtual high-interaction SSH honeypot which improves the stealthiness of monitoring by using virtual machine introspection (VMI) based tracing. We discuss the design of the system and how to extract valuable information such as user credential, executed commands, and file changes.
作者: gruelling    時(shí)間: 2025-3-29 20:50

作者: 氣候    時(shí)間: 2025-3-30 00:02

作者: Crater    時(shí)間: 2025-3-30 06:59

作者: 揉雜    時(shí)間: 2025-3-30 09:29

作者: 大量    時(shí)間: 2025-3-30 15:26

作者: esoteric    時(shí)間: 2025-3-30 17:59

作者: Mortal    時(shí)間: 2025-3-31 00:35
Secure IT Systems978-3-030-03638-6Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 摘要    時(shí)間: 2025-3-31 03:15

作者: PRISE    時(shí)間: 2025-3-31 08:58
https://doi.org/10.1007/978-3-030-03638-6authentication; computer crime; computer networks; cryptography; cyber security; data communication syste
作者: 率直    時(shí)間: 2025-3-31 11:52

作者: enflame    時(shí)間: 2025-3-31 15:38
nt authentication are the major key factor that avoids illegal distribution of digital data. However, due to availability of high bandwidth network, copyright violation is very common and many copies of data can be illegally distributed over network. Thus, to ensure multimedia security, image waterm




歡迎光臨 派博傳思國(guó)際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
通化县| 莎车县| 宜黄县| 泸定县| 时尚| 雷波县| 遵义县| 贺兰县| 丹棱县| 建瓯市| 镇宁| 郯城县| 浏阳市| 手机| 山丹县| 郯城县| 金塔县| 长白| 南雄市| 康乐县| 海淀区| 梅河口市| 巴里| 乌拉特前旗| 三穗县| 股票| 连州市| 无极县| 西和县| 沧州市| 龙海市| 天峨县| 万盛区| 定西市| 沐川县| 类乌齐县| 新巴尔虎右旗| 巴林左旗| 余干县| 古田县| 南城县|