標(biāo)題: Titlebook: Cloud Computing and Security; Third International Xingming Sun,Han-Chieh Chao,Elisa Bertino Conference proceedings 2017 Springer Internati [打印本頁(yè)] 作者: 惡夢(mèng) 時(shí)間: 2025-3-21 17:12
書(shū)目名稱Cloud Computing and Security影響因子(影響力)
書(shū)目名稱Cloud Computing and Security影響因子(影響力)學(xué)科排名
書(shū)目名稱Cloud Computing and Security網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Cloud Computing and Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Cloud Computing and Security被引頻次
書(shū)目名稱Cloud Computing and Security被引頻次學(xué)科排名
書(shū)目名稱Cloud Computing and Security年度引用
書(shū)目名稱Cloud Computing and Security年度引用學(xué)科排名
書(shū)目名稱Cloud Computing and Security讀者反饋
書(shū)目名稱Cloud Computing and Security讀者反饋學(xué)科排名
作者: AWL 時(shí)間: 2025-3-21 20:47
DLPDS: Learning Users’ Information Sharing Behaviors for Privacy Default Setting in Recommender Systttings. The result of the experiment support that our DLPDS model could gain users’ trust and aggregate more users information, and that adapting the privacy default settings to the user information sharing pattern may results in positive feedback that promoting better prediction accuracy of the rec作者: 來(lái)就得意 時(shí)間: 2025-3-22 01:16 作者: 膽小懦夫 時(shí)間: 2025-3-22 05:42 作者: Notorious 時(shí)間: 2025-3-22 11:08
https://doi.org/10.1007/978-3-322-88387-2ttings. The result of the experiment support that our DLPDS model could gain users’ trust and aggregate more users information, and that adapting the privacy default settings to the user information sharing pattern may results in positive feedback that promoting better prediction accuracy of the rec作者: Endoscope 時(shí)間: 2025-3-22 16:24 作者: Endoscope 時(shí)間: 2025-3-22 19:50
Xingming Sun,Han-Chieh Chao,Elisa BertinoIncludes supplementary material: 作者: overhaul 時(shí)間: 2025-3-22 22:43
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/228426.jpg作者: 投射 時(shí)間: 2025-3-23 01:35 作者: contradict 時(shí)間: 2025-3-23 06:10
978-3-319-68541-0Springer International Publishing AG 2017作者: 性學(xué)院 時(shí)間: 2025-3-23 10:51
New Construction of Low-Hit-Zone Frequency Hopping Sequence Sets with Optimal Partial Hamming Correler. Our construction yields LHZ FHS sets with optimal PPHC by interleaving techniques, in which short FHSs with good Hamming correlation are used as base sequences while certain appropriate sequences are chosen as shift sequences. The LHZ FHS sets proposed in this paper have new parameters not covered in the literature.作者: Grasping 時(shí)間: 2025-3-23 15:32
Schneckenmaschinen in der Verfahrenstechnik computation involves enormous computing resources, which is burdensome for the clients. Cloud computing enables computational resource-constrained clients to economically outsource such computations to the cloud server. In this paper, we investigate the privacy-preserving large-scale matrix determi作者: Diskectomy 時(shí)間: 2025-3-23 18:45 作者: Robust 時(shí)間: 2025-3-23 23:25
https://doi.org/10.1007/978-3-322-88387-2ate tastes covering several kinds of domains but focus on small number of topics. Leveraging all the user information available in several sites or domains may be beneficial for knowing the users better and generating higher-quality recommendations. However, aggregating all users’ information global作者: Agility 時(shí)間: 2025-3-24 03:52 作者: 不透氣 時(shí)間: 2025-3-24 06:30 作者: 使糾纏 時(shí)間: 2025-3-24 12:05 作者: 事情 時(shí)間: 2025-3-24 17:05
,Prüfverfahren für die Schneidhaltigkeit,d data, the independent Laplace noise implemented in current differential privacy preserving methods can be detected and sanitized, reducing privacy level. In prior work, we have proposed a correlated Laplace mechanism (CLM) to remedy this problem. But the concrete steps and detailed parameters to i作者: cartilage 時(shí)間: 2025-3-24 20:40 作者: Aboveboard 時(shí)間: 2025-3-25 00:29
https://doi.org/10.1007/978-3-662-33856-8tum system. In this paper, we study how QSS, an important branch of quantum cryptograph, is affected by noise or decoherence. QSS protocols for sharing classical information and quantum states are studied in four types of noise that usually encountered in real-world, i.e., the bit-flip, phase-flip (作者: homeostasis 時(shí)間: 2025-3-25 06:40
https://doi.org/10.1007/978-3-662-33856-8have been developed to alleviate the service selection burden of a target user. In traditional UCF-based recommendation approaches, the first key step is to find the candidate users who have the largest invoked-service intersection with the target user, as a larger invoked-service intersection often作者: Exonerate 時(shí)間: 2025-3-25 10:50 作者: overture 時(shí)間: 2025-3-25 14:34
https://doi.org/10.1007/978-3-662-36376-8so given to weigh the total efficiency of such QSS protocols. It is shown that the capacity of this protocol is ., higher than the ones using single two-level particles (the maximum capacity is 1) and the similar ones proposed by Tavakoli et al. and Karimipour et al. (the capacities are . and . resp作者: CLOWN 時(shí)間: 2025-3-25 17:57 作者: single 時(shí)間: 2025-3-25 22:40 作者: 禁令 時(shí)間: 2025-3-26 03:17 作者: Lacunar-Stroke 時(shí)間: 2025-3-26 06:43
https://doi.org/10.1007/978-3-642-52909-2mpanied with the fast development of cloud application. On the other hand, many authentication schemes with different methods have been presented over the last decades. To guarantee the valid access to remote server, smart cards are used on the client side. Moreover, user anonymity becomes a hot iss作者: Initial 時(shí)間: 2025-3-26 10:00
https://doi.org/10.1007/978-3-642-71332-3T, wireless sensor network (WSN) also attracts many researchers to pay close attention. In this paper, we investigate one latest scheme (Farash et al.’s scheme) that provides an efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet作者: 弄污 時(shí)間: 2025-3-26 14:46 作者: Accede 時(shí)間: 2025-3-26 20:25
Cloud Computing and Security978-3-319-68542-7Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Affluence 時(shí)間: 2025-3-26 21:01 作者: defile 時(shí)間: 2025-3-27 02:21
Practical Privacy-Preserving Outsourcing of?Large-Scale Matrix Determinant Computation?in the Cloud computation involves enormous computing resources, which is burdensome for the clients. Cloud computing enables computational resource-constrained clients to economically outsource such computations to the cloud server. In this paper, we investigate the privacy-preserving large-scale matrix determi作者: Arroyo 時(shí)間: 2025-3-27 06:47 作者: LATE 時(shí)間: 2025-3-27 13:18 作者: ENNUI 時(shí)間: 2025-3-27 17:02
New Construction of Low-Hit-Zone Frequency Hopping Sequence Sets with Optimal Partial Hamming Correler. Our construction yields LHZ FHS sets with optimal PPHC by interleaving techniques, in which short FHSs with good Hamming correlation are used as base sequences while certain appropriate sequences are chosen as shift sequences. The LHZ FHS sets proposed in this paper have new parameters not cover作者: Extort 時(shí)間: 2025-3-27 21:26 作者: Generalize 時(shí)間: 2025-3-27 21:56 作者: 斜谷 時(shí)間: 2025-3-28 02:52 作者: 事與愿違 時(shí)間: 2025-3-28 08:51
A Symmetric Authenticated Proxy Re-encryption Scheme with Provable Securitycloud storage systems. However, it only focuses on preventing a honest-but-curious proxy from learning anything about the encrypted data. Although it can be made to provide integrity without disrupting the key homomorphism property by using MAC then encrypt with counter-mode, it’s not a symmetric au作者: 過(guò)去分詞 時(shí)間: 2025-3-28 12:48
Quantum Secret Sharing in Noisy Environmenttum system. In this paper, we study how QSS, an important branch of quantum cryptograph, is affected by noise or decoherence. QSS protocols for sharing classical information and quantum states are studied in four types of noise that usually encountered in real-world, i.e., the bit-flip, phase-flip (作者: 說(shuō)笑 時(shí)間: 2025-3-28 16:40 作者: 背叛者 時(shí)間: 2025-3-28 20:25 作者: 一再煩擾 時(shí)間: 2025-3-29 00:41 作者: 水土 時(shí)間: 2025-3-29 05:25
An Inconsistency Detection Method for Security Policy and Firewall Policy Based on CSP Solverways designed under the instruction of security policy, which is a generic document that outlines the needs for network access permissions. The design of firewall policy should be consistent with security policy..If firewall policy is not consistent with security policy, firewall policy may violate 作者: Receive 時(shí)間: 2025-3-29 10:21 作者: ornithology 時(shí)間: 2025-3-29 12:35
A Mutation Approach of Detecting SQL Injection Vulnerabilitiestion plays a vital role in various domains such as e-finance and public-services. Inevitably, it will be followed by unprecedented amount of attacks and exploitations. Amongst all of those attacks, SQL injection attacks have consistently high rank in last years due to corresponding vulnerabilities. 作者: 紅腫 時(shí)間: 2025-3-29 16:28 作者: 口訣法 時(shí)間: 2025-3-29 21:54 作者: 打谷工具 時(shí)間: 2025-3-30 02:08 作者: 興奮過(guò)度 時(shí)間: 2025-3-30 07:08
Conference proceedings 2017n Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017.. .The 116 full papers and 11 short papers of these volumes were carefully ?reviewed and selected from 391 submissions. The papers are organized in ?topical sections such as: information hiding; cloud computing;? IOT ap作者: 疼死我了 時(shí)間: 2025-3-30 11:53 作者: 圓錐體 時(shí)間: 2025-3-30 14:11
,Prüfverfahren für die Schneidhaltigkeit,ric authenticated proxy re-encryption scheme which can prevent a malicious proxy from tampering users’ data. It can update the authentication tag as well as the ciphertext so that any intended user can verify the integrity of the encrypted data.作者: 美食家 時(shí)間: 2025-3-30 16:32 作者: 膝蓋 時(shí)間: 2025-3-30 22:40 作者: Tidious 時(shí)間: 2025-3-31 04:26 作者: 水槽 時(shí)間: 2025-3-31 05:56 作者: cinder 時(shí)間: 2025-3-31 12:36 作者: mutineer 時(shí)間: 2025-3-31 17:12 作者: 苦笑 時(shí)間: 2025-3-31 21:31 作者: 積極詞匯 時(shí)間: 2025-4-1 00:36
Reversible Data Hiding in Encrypted Image Based on Block Classification Scrambling disclosure of encrypted image obtained by the proposed method is reduced since the value and location of each pixel are both protected. Experimental results demonstrate that the probability for lossless recovery of proposed method is 100% even if for texture image Baboon at a high embedding rate of 0.15 bpp.作者: 注入 時(shí)間: 2025-4-1 02:11
A Mutation Approach of Detecting SQL Injection Vulnerabilitiesmutation operators set to its underpinning. Using this approach we can produce test inputs that cause executable and malignant SQL statement efficiently. Besides that, we do numerous experiments and the results demonstrate that the mutation approach can detect SQL injection vulnerabilities and generate inputs that bypass web application firewalls.作者: apiary 時(shí)間: 2025-4-1 08:59
A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computingnly makes user anonymous but also performs well in basic aspects compared with recent schemes. The new scheme is practical and efficient via our comparison and it overcomes various attacks and meets security requirements in public opinion. ...作者: Expostulate 時(shí)間: 2025-4-1 12:21
0302-9743 ngs of the Third International Conference on Cloud Computing and Security, ICCCS 2017, held in Nanjing, China, in June 2017.. .The 116 full papers and 11 short papers of these volumes were carefully ?reviewed and selected from 391 submissions. The papers are organized in ?topical sections such as: i作者: 冒號(hào) 時(shí)間: 2025-4-1 17:33
https://doi.org/10.1007/978-3-662-36376-8wo-level particles (the maximum capacity is 1) and the similar ones proposed by Tavakoli et al. and Karimipour et al. (the capacities are . and . respectively). Besides, it is secure against several common attacks and feasible with present-day technology.作者: maverick 時(shí)間: 2025-4-1 22:02
A High-Capacity Quantum Secret Sharing Protocol Based on Single ,-Level Particleswo-level particles (the maximum capacity is 1) and the similar ones proposed by Tavakoli et al. and Karimipour et al. (the capacities are . and . respectively). Besides, it is secure against several common attacks and feasible with present-day technology.