標題: Titlebook: Applications and Techniques in Information Security; 6th International Co Wenjia Niu,Gang Li,Lynn Batten Conference proceedings 2015 Spring [打印本頁] 作者: necrosis 時間: 2025-3-21 19:01
書目名稱Applications and Techniques in Information Security影響因子(影響力)
書目名稱Applications and Techniques in Information Security影響因子(影響力)學科排名
書目名稱Applications and Techniques in Information Security網(wǎng)絡(luò)公開度
書目名稱Applications and Techniques in Information Security網(wǎng)絡(luò)公開度學科排名
書目名稱Applications and Techniques in Information Security被引頻次
書目名稱Applications and Techniques in Information Security被引頻次學科排名
書目名稱Applications and Techniques in Information Security年度引用
書目名稱Applications and Techniques in Information Security年度引用學科排名
書目名稱Applications and Techniques in Information Security讀者反饋
書目名稱Applications and Techniques in Information Security讀者反饋學科排名
作者: 悅耳 時間: 2025-3-21 23:18 作者: 運動性 時間: 2025-3-22 04:02 作者: Flirtatious 時間: 2025-3-22 07:38
An Image Encryption Algorithm Based on Chua’s Chaos and Baker’s Transformation image into blocks with size 8.8 and transform each block into three-dimensional image of binary number with size 8.8.8. Then, preprocess the real chaotic sequences output by Chua’s system and revise grey level of the pixel in three-dimensional image according to sequences value. Finally, use baker’作者: Obscure 時間: 2025-3-22 09:43 作者: aphasia 時間: 2025-3-22 13:08 作者: LATER 時間: 2025-3-22 20:19
Public Key Timed-Release Attribute-Based Encryptiondependent ABE problem. In our PKTRABE model, the sender encrypts a message so that only the intended receivers who own some specified attributes can decrypt it after a specified time in the future. We begin by explaining what is PKTRABE. Then, we formalize the notion of basic PKTRABE and its securit作者: Repetitions 時間: 2025-3-22 21:59
Color Image Encryption in CIE L*a*b* Space during the last decades. Currently, little attention has been paid to non-RGB color spaces such as HSV, YUV and L*a*b* color spaces in the color image encryption community. In this paper we use . encryption schemes in more informative channels and . encryption schemes in less informative channels. 作者: FAZE 時間: 2025-3-23 02:27
Discover Abnormal Behaviors Using HTTP Header Fields Measurementlications or even unknown protocols. As a result, some malicious applications begin to shape themselves as common application protocols to get rid of detection. Being an important protocol for many Internet services, HTTP is responsible more than half of the total traffic volume. As a result, many a作者: Diaphragm 時間: 2025-3-23 07:56 作者: 魅力 時間: 2025-3-23 11:49
A Lightweight Code-Based Authentication Protocol for RFID Systems so on. With the widespread adoption of RFID, the security and privacy issues of RFID systems are drawing more and more attention. In this paper, we propose a lightweight mutual authentication protocol based on error correction code for RFID systems with constant authentication time. Further analysi作者: Dappled 時間: 2025-3-23 16:53 作者: 起來了 時間: 2025-3-23 20:01
Structural Analysis of IWA Social Networkonsible comments or articles. While most of related work focused on how to detect IWA using a classifier, there is a lack of analysis about the distribution and behavior characteristics of the special group. To address this issue, this paper constructs an IWA social network in which IWAs are core no作者: lethargy 時間: 2025-3-23 22:20
A Differentially Private Method for Reward-Based Spatial Crowdsourcingsolution requires the workers send their locations to a centralized server, which leads to a privacy threat. One of the key challenges of spatial crowdsourcing is to maximize the number of assigned tasks with workers’ location privacy preserved. In this paper, we focus on the reward-based spatial cr作者: AUGER 時間: 2025-3-24 05:33
Do Applications Perform Its Original Design? A Preliminary Analysis from Internet Big Dataer TCP. Every application layer protocol is designed to perform a specific purpose, for example File Transfer Protocol (FTP) is designed for file transfer. Therefore every application layer protocol has different performance expectations. In this paper, we try to observe that whether characteristics作者: 獨輪車 時間: 2025-3-24 09:38
Trust Prediction with Trust Antecedent Framework Regularizationintegrative and well-known model in management science, which takes ability, benevolence and integrity as three key factors to explain how trust relations are established between a trustor and a trustee. In this paper, we propose a new trust prediction model based on Trust Antecedent framework (TA) 作者: strain 時間: 2025-3-24 11:08 作者: Chameleon 時間: 2025-3-24 15:33 作者: 星球的光亮度 時間: 2025-3-24 21:27
A Differentially Private Method for Reward-Based Spatial Crowdsourcingowdsourcing and propose a two-stage method which consists of constructing a differentially private contour plot followed by task assignment with optimized-reward allocation. Experiments on real dataset demonstrate the availability of the proposed method.作者: 殺蟲劑 時間: 2025-3-25 00:35 作者: STAT 時間: 2025-3-25 04:14 作者: cunning 時間: 2025-3-25 07:32 作者: institute 時間: 2025-3-25 15:08
Tiffany Naets,Inez Buyck,Caroline Braetabnormal behaviors in HTTP protocol. A method based on HTTP header fields’ measurement is proposed. We measure HTTP header fields’ information from HTTP traffic from normal application such as IE-8, find some characteristics and we use them to find abnormal behaviors of shaping HTTP protocol.作者: CHASM 時間: 2025-3-25 18:41
Explosive Humiliation and News Mediaion with a regularization term to enhance the trust prediction performance. Our experiments conducted on a real-word dataset from Ciao demonstrate that our approaches outperform other state-of-the-art methods in trust prediction.作者: 打包 時間: 2025-3-25 22:22 作者: 開頭 時間: 2025-3-26 02:22 作者: CLOUT 時間: 2025-3-26 06:36 作者: Focus-Words 時間: 2025-3-26 09:32 作者: 我沒有強迫 時間: 2025-3-26 15:03
Ontregelde emoties: vervreemdings transformation to scramble image blocks and an encryption image will be obtained by this algorithm. The experimental results show that this algorithm has good encryption performance and high security.作者: HEDGE 時間: 2025-3-26 18:56 作者: 挖掘 時間: 2025-3-27 00:47
https://doi.org/10.1007/978-90-313-6535-7owdsourcing and propose a two-stage method which consists of constructing a differentially private contour plot followed by task assignment with optimized-reward allocation. Experiments on real dataset demonstrate the availability of the proposed method.作者: CLEAR 時間: 2025-3-27 03:28 作者: Subdue 時間: 2025-3-27 05:27
https://doi.org/10.1007/978-90-313-6535-7 on the IWA social network, and analyze the community detection result. Experimental results show that IWA social network is deserved to analyze and discuss, and we found some interesting phenomena which are very helpful to better understanding and monitoring the IWA accounts.作者: Morphine 時間: 2025-3-27 09:58
Introducing Psychosocial Studies of Emotion show that the performance of application layer protocol is still in chaotic and some result is difficult to find a reasonable explanation. We believe that this report is a starting point for both researchers and Internet participators to explore possible reasoning behind of the results.作者: carbohydrate 時間: 2025-3-27 16:57 作者: judiciousness 時間: 2025-3-27 20:58 作者: Infusion 時間: 2025-3-28 00:18
Do Applications Perform Its Original Design? A Preliminary Analysis from Internet Big Data show that the performance of application layer protocol is still in chaotic and some result is difficult to find a reasonable explanation. We believe that this report is a starting point for both researchers and Internet participators to explore possible reasoning behind of the results.作者: 協(xié)議 時間: 2025-3-28 02:23
1865-0929 es in Information Security, ATIS 2015, held in Beijing, China, in November 2015.?.The 25 revised full papers and 10 short papers presented were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on?invited speeches;?cryptograph;?evaluation, standards a作者: 放逐 時間: 2025-3-28 06:53
https://doi.org/10.1007/978-90-368-2050-9ly quantum algorithms in differential cryptanalysis, and analysis their efficiencies and success probabilities. One method is using quantum algorithm in the high probability differential finding period for every S-Box. The second method is taking the encryption as a whole, using quantum algorithm in this process.作者: 無孔 時間: 2025-3-28 14:22 作者: NOCT 時間: 2025-3-28 18:31
https://doi.org/10.1007/978-90-368-2308-1attack, details of steps involved in the occurred attack scenario, exploited vulnerabilities, and generated system damages. This is of important significance for network forensic analysis. As a case study, we successfully find a new attack scenario of OpenID protocol and the modified protocol is introduced as well.作者: Capitulate 時間: 2025-3-28 22:30 作者: Eructation 時間: 2025-3-29 01:53
Quantum Differential Cryptanalysis to the Block Ciphersly quantum algorithms in differential cryptanalysis, and analysis their efficiencies and success probabilities. One method is using quantum algorithm in the high probability differential finding period for every S-Box. The second method is taking the encryption as a whole, using quantum algorithm in this process.作者: gospel 時間: 2025-3-29 03:56
Public Key Timed-Release Attribute-Based Encryptionecrypt it after a specified time in the future. We begin by explaining what is PKTRABE. Then, we formalize the notion of basic PKTRABE and its security game model. Finally, we give two concrete schemes which are secure under the BDH and DBDH assumption in the random oracle model. Conclusions and future work are also summarized.作者: DEMN 時間: 2025-3-29 10:29
Reconstruction of Potential Attack Scenarios of the OpenID Protocol Towards Network Forensics Analysattack, details of steps involved in the occurred attack scenario, exploited vulnerabilities, and generated system damages. This is of important significance for network forensic analysis. As a case study, we successfully find a new attack scenario of OpenID protocol and the modified protocol is introduced as well.作者: Evolve 時間: 2025-3-29 11:30 作者: FLAG 時間: 2025-3-29 17:57
Applications and Techniques in Information Security6th International Co作者: receptors 時間: 2025-3-29 19:58 作者: Nonflammable 時間: 2025-3-30 01:14 作者: Prognosis 時間: 2025-3-30 07:03
Emotieregulatie in de ontwikkelingilar results with the method that conducts the same scheme in each channel of the RGB color space, while consuming less time. In addition, our method can resistant several attacks such as brute-force attack, statistic attack, correlation attack.作者: 容易生皺紋 時間: 2025-3-30 08:11 作者: artless 時間: 2025-3-30 13:50 作者: Meditate 時間: 2025-3-30 18:48
Color Image Encryption in CIE L*a*b* Spaceilar results with the method that conducts the same scheme in each channel of the RGB color space, while consuming less time. In addition, our method can resistant several attacks such as brute-force attack, statistic attack, correlation attack.作者: CAND 時間: 2025-3-31 00:10
Wenjia Niu,Gang Li,Lynn BattenIncludes supplementary material: 作者: amyloid 時間: 2025-3-31 03:15 作者: boisterous 時間: 2025-3-31 07:28 作者: 值得 時間: 2025-3-31 11:51
978-3-662-48682-5Springer-Verlag Berlin Heidelberg 2015作者: 宣誓書 時間: 2025-3-31 16:46
Het reguleren van emotionele reactiesn structure is proposed. The algorithm consists of two parts: firstly, Zigzag transformation is used to scramble pixel position of the color image through three channels; then, 3-Dimension Logistic chaotic map is utilized to diffuse pixel values through three channels. To solve the problem of large 作者: 他日關(guān)稅重重 時間: 2025-3-31 19:22 作者: DEBT 時間: 2025-3-31 22:14 作者: 織物 時間: 2025-4-1 03:11
Ontregelde emoties: vervreemding image into blocks with size 8.8 and transform each block into three-dimensional image of binary number with size 8.8.8. Then, preprocess the real chaotic sequences output by Chua’s system and revise grey level of the pixel in three-dimensional image according to sequences value. Finally, use baker’