找回密碼
 To register

QQ登錄

只需一步,快速開(kāi)始

掃一掃,訪問(wèn)微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Security; 12th International C Pierangela Samarati,Moti Yung,Claudio A. Ardagna Conference proceedings 2009 Springer-Verlag Ber

[復(fù)制鏈接]
查看: 34176|回復(fù): 63
樓主
發(fā)表于 2025-3-21 19:16:15 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書(shū)目名稱(chēng)Information Security
副標(biāo)題12th International C
編輯Pierangela Samarati,Moti Yung,Claudio A. Ardagna
視頻videohttp://file.papertrans.cn/466/465256/465256.mp4
叢書(shū)名稱(chēng)Lecture Notes in Computer Science
圖書(shū)封面Titlebook: Information Security; 12th International C Pierangela Samarati,Moti Yung,Claudio A. Ardagna Conference proceedings 2009 Springer-Verlag Ber
描述.This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009...The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on analysis techniques, hash functions, database security and biometrics, algebraic attacks and proxy re-encryption, distributed system security, identity management and authentication, applied cryptography, access control, MAC and nonces, and P2P and Web services..
出版日期Conference proceedings 2009
關(guān)鍵詞access control; algebraic attacks; anonymity; applied cryptography; authentication; behavior-based detect
版次1
doihttps://doi.org/10.1007/978-3-642-04474-8
isbn_softcover978-3-642-04473-1
isbn_ebook978-3-642-04474-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer-Verlag Berlin Heidelberg 2009
The information of publication is updating

書(shū)目名稱(chēng)Information Security影響因子(影響力)




書(shū)目名稱(chēng)Information Security影響因子(影響力)學(xué)科排名




書(shū)目名稱(chēng)Information Security網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱(chēng)Information Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱(chēng)Information Security被引頻次




書(shū)目名稱(chēng)Information Security被引頻次學(xué)科排名




書(shū)目名稱(chēng)Information Security年度引用




書(shū)目名稱(chēng)Information Security年度引用學(xué)科排名




書(shū)目名稱(chēng)Information Security讀者反饋




書(shū)目名稱(chēng)Information Security讀者反饋學(xué)科排名




單選投票, 共有 1 人參與投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

1票 100.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用戶(hù)組沒(méi)有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 22:55:37 | 只看該作者
A2M: Access-Assured Mobile Desktop Computingric traffic characteristics by using multi-path routing to send a small number of replicas of each packet transmitted from client to server. This packet replication through different paths, diversifies the client-server communication, boosting system resiliency and reducing end-to-end latency. Our a
板凳
發(fā)表于 2025-3-22 00:59:12 | 只看該作者
Automated Spyware Collection and Analysisb. We use three different techniques to analyze these programs: an online database of spyware-related identifiers, signature-based scanners, and a behavior-based malware detection technique. We present the results of a measurement study that lasted about ten months. During this time, we crawled over
地板
發(fā)表于 2025-3-22 05:14:46 | 只看該作者
Towards Unifying Vulnerability Information for Attack Graph Constructionrectly used for generating attack graph, due to missing unification of the provided information. This paper challenged the automatic extraction of meaningful information from various existing vulnerability databases. After comparing existing vulnerability databases, a new method is proposed for auto
5#
發(fā)表于 2025-3-22 11:36:49 | 只看該作者
6#
發(fā)表于 2025-3-22 12:53:07 | 只看該作者
7#
發(fā)表于 2025-3-22 18:22:15 | 只看該作者
Amitabh Saxena,Brecht Wyseur,Bart Preneeldeed, this problem is so crucial that those of us who are trying to systematize the principles by which large-scale organizations of . kind can be governed (e.g., . the institution of science itself) regard the problem as one of the major concerns of the discipline of Management Science.
8#
發(fā)表于 2025-3-22 21:12:08 | 只看該作者
Bogdan Groza,Marius Minean he . is the one he . taken! Instead of data always guiding action, the taking of action often guides the collection of data in the sense that the proper data often cannot be uncovered except through the risking of action (Churchman, 1971)! (This point will be illustrated in the later parts of this
9#
發(fā)表于 2025-3-23 04:16:37 | 只看該作者
10#
發(fā)表于 2025-3-23 06:04:34 | 只看該作者
Suvasini Panigrahi,Shamik Suralnd the first-class disciplines to comb, found that the classification of construction first-class university and the first-class discipline policy model (hierarchical governance, department coordination), combined with the current classification results build first-class university and the first-cla
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛(ài)論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-25 14:46
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
廉江市| 宣城市| 塔河县| 赣榆县| 封丘县| 靖边县| 化州市| 东光县| 辽宁省| 铜陵市| 临泽县| 威远县| 双辽市| 家居| 漳州市| 汽车| 芜湖县| 加查县| 白城市| 井研县| 滨州市| 安达市| 浦北县| 精河县| 嘉定区| 平南县| 荔波县| 长顺县| 应用必备| 长沙县| 宜川县| 昭觉县| 普兰店市| 哈巴河县| 上栗县| 上蔡县| 紫阳县| 尖扎县| 哈密市| 大兴区| 五家渠市|