標(biāo)題: Titlebook: Cloud Computing and Security; 4th International Co Xingming Sun,Zhaoqing Pan,Elisa Bertino Conference proceedings 2018 Springer Nature Swit [打印本頁] 作者: LEVEE 時(shí)間: 2025-3-21 19:16
書目名稱Cloud Computing and Security影響因子(影響力)
書目名稱Cloud Computing and Security影響因子(影響力)學(xué)科排名
書目名稱Cloud Computing and Security網(wǎng)絡(luò)公開度
書目名稱Cloud Computing and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Cloud Computing and Security被引頻次
書目名稱Cloud Computing and Security被引頻次學(xué)科排名
書目名稱Cloud Computing and Security年度引用
書目名稱Cloud Computing and Security年度引用學(xué)科排名
書目名稱Cloud Computing and Security讀者反饋
書目名稱Cloud Computing and Security讀者反饋學(xué)科排名
作者: Redundant 時(shí)間: 2025-3-21 21:59 作者: 現(xiàn)實(shí) 時(shí)間: 2025-3-22 04:24
Efficient Multiparty Quantum Secret Sharing Scheme in High-Dimensional System a drawback of the scheme is that only half of the quantum resource is effective, and the other half has to be discarded. To enhance the efficiency of the scheme, we propose an efficient multiparty QSS scheme and generalized it in high-dimensional system. By using a measurement-delay strategy on the作者: 多樣 時(shí)間: 2025-3-22 07:36
EkCRNN: A kNN Privacy Preserving Query Algorithm Based on Circular Region Extensionr locations to get the service, which may cause the disclosure of their location privacy. In order to protect the location privacy, a typical way is to convert the specific location into a location area. After finding the interest points around the region, the server needs to refine the result set t作者: Hot-Flash 時(shí)間: 2025-3-22 11:20 作者: nautical 時(shí)間: 2025-3-22 15:51
Focused Crawler Framework Based on Open Search Engineextract those match the users’ interests. However, in data acquisition stage, users usually have customize demand on acquiring data. Ordinary crawler systems are very resource-constrained so they cannot traverse the entire internet. Meanwhile, search engines can satisfy these demand but it relies on作者: nautical 時(shí)間: 2025-3-22 17:02
Identity Based Privacy Information Sharing with Similarity Test in Cloud Environmentall, are used to prevent information from stealing. However, the above mentioned technologies severely hinder information sharing, especially in some special areas, such as medical industries in which doctors need to share similar patient’s information to improve the effectiveness of treatment. The 作者: 乏味 時(shí)間: 2025-3-22 21:41 作者: 大雨 時(shí)間: 2025-3-23 03:34 作者: Acupressure 時(shí)間: 2025-3-23 06:11
Mass Discovery of Android Malware Behavioral Characteristics for Detection Considerationeir behavioral characteristics at a large scale, and use them to detect Android malware. In this work, we are motivated to discover the discriminatory features extracted from Android APK files for Android malware detection. To achieve this goal, firstly we extract a very large number of static featu作者: Toxoid-Vaccines 時(shí)間: 2025-3-23 12:01
Medical Information Access Control Method Based on Weighted Information Entropy been generated. Medical information involves the privacy of the patient. At present, many lawless use various means to obtain the patient’s privacy information and take advantage of it for benefits. At present, there are many research methods of medical data access control, but the structure of med作者: 破譯 時(shí)間: 2025-3-23 17:53 作者: Flat-Feet 時(shí)間: 2025-3-23 19:35
Modeling and Data Analysis of the Balise Systeminformation transmission to ensure the safety and reliability of train operation. However, Balise is a transmission point device which is based on electronic coupling, the up-link signal easily affected by surrounding electromagnetic field. Aiming at the requirements for developments of high-speed r作者: Extricate 時(shí)間: 2025-3-24 01:46 作者: 無聊點(diǎn)好 時(shí)間: 2025-3-24 05:24 作者: ARENA 時(shí)間: 2025-3-24 07:21 作者: 遺棄 時(shí)間: 2025-3-24 13:27
Privacy-Preserved Prediction for Mobile Application Adoptionobile application (also known as app) out of hundreds in an app store. Thus, predicting which app will be installed by a specific user can help both users and app store operators. Existing works have focused on this problem and tried to use various features and algorithms to help recommend apps to u作者: Concrete 時(shí)間: 2025-3-24 14:54 作者: Noisome 時(shí)間: 2025-3-24 20:12 作者: prosperity 時(shí)間: 2025-3-24 23:59
978-3-030-00011-0Springer Nature Switzerland AG 2018作者: LANCE 時(shí)間: 2025-3-25 06:11 作者: leniency 時(shí)間: 2025-3-25 10:31
Schmerztherapie ohne Medikamentenuity plan of action. At the same time, digital continuity has become a hot topic in electronic document research. However, there is still a lack of technologies and measures to protect digital continuity..Data usability is the foundation of digital continuity, and its focus is on making digital inf作者: 縫紉 時(shí)間: 2025-3-25 12:21 作者: AVERT 時(shí)間: 2025-3-25 18:44
https://doi.org/10.1007/978-3-7091-5306-2 a drawback of the scheme is that only half of the quantum resource is effective, and the other half has to be discarded. To enhance the efficiency of the scheme, we propose an efficient multiparty QSS scheme and generalized it in high-dimensional system. By using a measurement-delay strategy on the作者: 多嘴 時(shí)間: 2025-3-25 22:28 作者: RAFF 時(shí)間: 2025-3-26 03:20
Papain-Based Dissociation of , Cells,vy Hitters is of particular importance in both network management and security applications. Traditional methods are focusing on sampling in the middle box and analyzing those packets using streaming algorithms. The paradigm of Software Defined Network (SDN) simplifies the work of flow counting. How作者: Indicative 時(shí)間: 2025-3-26 07:05
Elke F. Roovers,Kerstin Bartschererextract those match the users’ interests. However, in data acquisition stage, users usually have customize demand on acquiring data. Ordinary crawler systems are very resource-constrained so they cannot traverse the entire internet. Meanwhile, search engines can satisfy these demand but it relies on作者: 真實(shí)的人 時(shí)間: 2025-3-26 11:44
,Die Gründung (Fundierung) der H?mmer,all, are used to prevent information from stealing. However, the above mentioned technologies severely hinder information sharing, especially in some special areas, such as medical industries in which doctors need to share similar patient’s information to improve the effectiveness of treatment. The 作者: 聲音刺耳 時(shí)間: 2025-3-26 13:30 作者: fallible 時(shí)間: 2025-3-26 20:09
Die Herstellung der Schmiedegesenke,ser’s password and biometric, are more secure than password-based single-factor authentication protocols which are widely used in practice. However, almost all the existed two-factor authentication protocols and multi-factor authentication protocols are based on smart cards, which will inevitably le作者: CRAFT 時(shí)間: 2025-3-27 00:17 作者: pantomime 時(shí)間: 2025-3-27 04:02
Plaudereien aus der Gesenkschmiede, been generated. Medical information involves the privacy of the patient. At present, many lawless use various means to obtain the patient’s privacy information and take advantage of it for benefits. At present, there are many research methods of medical data access control, but the structure of med作者: 姑姑在炫耀 時(shí)間: 2025-3-27 06:40 作者: fodlder 時(shí)間: 2025-3-27 12:21 作者: foodstuff 時(shí)間: 2025-3-27 14:11 作者: investigate 時(shí)間: 2025-3-27 19:35 作者: 仇恨 時(shí)間: 2025-3-28 01:06 作者: 膠水 時(shí)間: 2025-3-28 04:11
https://doi.org/10.1007/978-3-663-05566-2obile application (also known as app) out of hundreds in an app store. Thus, predicting which app will be installed by a specific user can help both users and app store operators. Existing works have focused on this problem and tried to use various features and algorithms to help recommend apps to u作者: pester 時(shí)間: 2025-3-28 08:15
Zusammenfassung der Ergebnisse,ial?institutions, internet firms, and almost all the data contain privacy information. Meanwhile, the acquisition of big data and privacy protection influence the rapid development of big data for credit scoring. And the introduction of big data for credit scoring proposes a lot of requirements for 作者: 低能兒 時(shí)間: 2025-3-28 11:27 作者: 不如屎殼郎 時(shí)間: 2025-3-28 16:41
0302-9743 ud Computing and Security, ICCCS 2018, held in Haikou, China, in June 2018. The 386 full papers of these six volumes were carefully reviewed and selected from 1743 submissions. The papers cover ideas and achievements in the theory and practice of all areas of inventive systems which includes control作者: JAUNT 時(shí)間: 2025-3-28 18:49
https://doi.org/10.1007/978-3-7091-5306-2 the scheme, we propose an efficient multiparty QSS scheme and generalized it in high-dimensional system. By using a measurement-delay strategy on the dealer’s side, the efficiency of the improved QSS schemes can be raised to 100%, rather than 50% or . in previous schemes.作者: 極力證明 時(shí)間: 2025-3-29 01:22
Efficient Multiparty Quantum Secret Sharing Scheme in High-Dimensional System the scheme, we propose an efficient multiparty QSS scheme and generalized it in high-dimensional system. By using a measurement-delay strategy on the dealer’s side, the efficiency of the improved QSS schemes can be raised to 100%, rather than 50% or . in previous schemes.作者: 抑制 時(shí)間: 2025-3-29 03:11 作者: B-cell 時(shí)間: 2025-3-29 09:59
https://doi.org/10.1007/978-3-642-56379-9aluate network security situation and provide the best reinforcement schema. Experimental results on a specific network indicate that the approach is more precise and more suitable for a real network environment. The reinforcement schema can effectively prevent the propagation of threats and reduce security risks.作者: flaunt 時(shí)間: 2025-3-29 12:12 作者: immunity 時(shí)間: 2025-3-29 18:36 作者: Conscientious 時(shí)間: 2025-3-29 21:54
Schmerztherapie ohne Medikamentebased on programming regression (PR), the risk-evaluation-index weight distribution module was designed, and the risk assessment module with high sensitive value to access requests was constructed. Experimental results show that CPDAC is effective and feasible; in addition, the model is better in real-time and dynamic than other existing models.作者: concert 時(shí)間: 2025-3-30 02:11 作者: 詩集 時(shí)間: 2025-3-30 06:03
,Spezielle Verwendung der Mineralschmier?le, behavior based on the context data in high-quality threat intelligence. In the absence of high-quality threat intelligence, the mixed strategy Nash equilibrium is used to predict the attack behavior. According to the game relationship between attack strategy and defense strategy.作者: Subdue 時(shí)間: 2025-3-30 10:16
0302-9743 bject areas as follows: cloud computing, cloud security, encryption, information hiding, IoT security, multimedia forensics.978-3-030-00011-0978-3-030-00012-7Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 喊叫 時(shí)間: 2025-3-30 15:06 作者: corn732 時(shí)間: 2025-3-30 16:36
,Die Gründung (Fundierung) der H?mmer, an efficient identity based privacy information sharing with similarity test in cloud environment. Our scheme can search out similar data of the target data on encrypted content. Besides, we use advanced Locality-Sensitive Hashing function to generate index for data to protect the privacy information of users.作者: flutter 時(shí)間: 2025-3-30 23:35 作者: SNEER 時(shí)間: 2025-3-31 03:20 作者: 領(lǐng)袖氣質(zhì) 時(shí)間: 2025-3-31 05:49
Digital Continuity Guarantee Based on Data Consistency in Cloud Storagefor verifying the consistency of electronic record data based on functional dependency theory. Moreover, an example of verifying the data consistency based on functional dependency theory is given to check the data consistency of electronic record periodically.作者: Heart-Attack 時(shí)間: 2025-3-31 09:39
Identity Based Privacy Information Sharing with Similarity Test in Cloud Environment an efficient identity based privacy information sharing with similarity test in cloud environment. Our scheme can search out similar data of the target data on encrypted content. Besides, we use advanced Locality-Sensitive Hashing function to generate index for data to protect the privacy information of users.