標(biāo)題: Titlebook: Cloud Computing and Security; First International Zhiqiu Huang,Xingming Sun,Jian Wang Conference proceedings 2015 Springer International P [打印本頁] 作者: opioid 時間: 2025-3-21 16:11
書目名稱Cloud Computing and Security影響因子(影響力)
書目名稱Cloud Computing and Security影響因子(影響力)學(xué)科排名
書目名稱Cloud Computing and Security網(wǎng)絡(luò)公開度
書目名稱Cloud Computing and Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Cloud Computing and Security被引頻次
書目名稱Cloud Computing and Security被引頻次學(xué)科排名
書目名稱Cloud Computing and Security年度引用
書目名稱Cloud Computing and Security年度引用學(xué)科排名
書目名稱Cloud Computing and Security讀者反饋
書目名稱Cloud Computing and Security讀者反饋學(xué)科排名
作者: recede 時間: 2025-3-21 23:15
https://doi.org/10.1007/978-3-322-88128-1trol, and fine-grained access. Furthermore, for the purpose of reducing cost of access cloud storage, we proposed an efficiency access control optimizing technique based on local agency, which can replace users to complete the ciphertext access control related operations, and cache frequently access作者: 圣人 時間: 2025-3-22 00:51 作者: 會議 時間: 2025-3-22 07:42
Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based e PUF outputs. Thus the proposed DAPUF approach can provide large number of PUF instances with high accuracy and reverse-engineering resistant. Through the proposed obfuscation scheme, the designer can control the IC’s operation modes (. and .) and functionalities, and can also remotely disable the 作者: 令人作嘔 時間: 2025-3-22 11:35 作者: GREEN 時間: 2025-3-22 15:47 作者: GREEN 時間: 2025-3-22 20:00 作者: 留戀 時間: 2025-3-22 22:53 作者: gregarious 時間: 2025-3-23 03:37 作者: 鬧劇 時間: 2025-3-23 05:42 作者: Pigeon 時間: 2025-3-23 12:11
Reaktionsmechanismus in Salzschmelzene Trojan attacks based on chaos finite state machine (FSM) and delay chains array physical unclonable function (PUF). We exploits the pseudo-random characteristics of the .-. to propose a chaos FSM design method which can generate exponentially many random states and transitions to obfuscate the chi作者: Etching 時間: 2025-3-23 14:30
https://doi.org/10.1007/978-3-7091-5056-6vertheless, this promising computing services inevitably brings in new threats and challenges, for example, input and output data privacy and cheating detection. Since large-scale systems of linear equations(LSLE) is widely rooted in many engineer and scientific applications. In this paper, for the 作者: Outspoken 時間: 2025-3-23 21:31
https://doi.org/10.1007/978-3-7091-5056-6on has been one of hotspots for the advantage of fine-grained access control. In this paper, a provably secure ciphertext-policy hierarchical attribute-based encryption is proposed, which can satisfy the need of attribute hierarchy in attribute-based encryption and overcome the shortage of access co作者: 摻和 時間: 2025-3-24 01:46
Eva Derndorfer,Elisabeth Buchingerr (DO) stores its real-time data that are periodically submitted by its subordinate data collectors (DCs) on cloud service provider (CSP) in encrypted form and sometimes executes range query. The semi-trusted CSP is curious about the data and may return incomplete query results to DO. We divide time作者: 網(wǎng)絡(luò)添麻煩 時間: 2025-3-24 03:31 作者: Feckless 時間: 2025-3-24 07:24
,Einleitung und Literaturübersicht,ng which is called the key escrow problem. Key generation center (KGC) can generate the secret key of a user with arbitrary set of attributes. Even worse, KGC can decrypt ciphertext directly using its master key. This could be a potential intimidation to data security and privacy. In this paper, we 作者: myopia 時間: 2025-3-24 10:48 作者: Curmudgeon 時間: 2025-3-24 16:10 作者: LOPE 時間: 2025-3-24 19:46 作者: URN 時間: 2025-3-25 01:04 作者: 我們的面粉 時間: 2025-3-25 04:48
https://doi.org/10.1007/978-3-642-50781-6existing information hiding approaches so far have been very difficult to resist the detecting techniques in steganalysis based on statistical analysis. Based on the Chinese mathematical expression, an efficient method of coverless text information hiding is presented, which is a brand-new method fo作者: 萬神殿 時間: 2025-3-25 10:38 作者: Dawdle 時間: 2025-3-25 12:38 作者: nettle 時間: 2025-3-25 18:32 作者: 受傷 時間: 2025-3-25 21:33
Schnitt-, Stanz- und Ziehwerkzeugee growing number of malware. In order to improve the malware clustering algorithm, this paper uses the clustering algorithm based on . ., and uses frequencies of the system calls as the features for input. This algorithm combined with the . which is traditional density-based clustering algorithm in 作者: Offstage 時間: 2025-3-26 01:48
Schnitt-, Stanz- und Ziehwerkzeugeign and analyze these protocols in the dynamic setting, due to its high uncertainty, where typical properties include the average steps of electing a leader eventually, the scalability etc. In this paper, we propose a novel model-based approach for analyzing leader election protocols of dynamic syst作者: Nucleate 時間: 2025-3-26 05:10 作者: 暫時過來 時間: 2025-3-26 09:19 作者: indemnify 時間: 2025-3-26 15:21 作者: 歹徒 時間: 2025-3-26 20:18
VH: A Lightweight Block Cipher Based on Dual Pseudo-random Transformation ciphers, the block size of VH is 64-bit and the key size is 80-bit. Our security evaluation shows that VH can achieve enough security margin against known attacks, such as differential cryptanalysis, linear cryptanalysis, and impossible differential cryptanalysis etc. Furthermore, VH can be impleme作者: 平淡而無味 時間: 2025-3-26 21:08
Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based e Trojan attacks based on chaos finite state machine (FSM) and delay chains array physical unclonable function (PUF). We exploits the pseudo-random characteristics of the .-. to propose a chaos FSM design method which can generate exponentially many random states and transitions to obfuscate the chi作者: 令人悲傷 時間: 2025-3-27 04:49
Secure and Efficient Protocol for Outsourcing Large-Scale Systems of Linear Equations to the Cloudvertheless, this promising computing services inevitably brings in new threats and challenges, for example, input and output data privacy and cheating detection. Since large-scale systems of linear equations(LSLE) is widely rooted in many engineer and scientific applications. In this paper, for the 作者: laceration 時間: 2025-3-27 08:29 作者: 詩集 時間: 2025-3-27 11:10
Privacy-Preserving Multidimensional Range Query on Real-Time Datar (DO) stores its real-time data that are periodically submitted by its subordinate data collectors (DCs) on cloud service provider (CSP) in encrypted form and sometimes executes range query. The semi-trusted CSP is curious about the data and may return incomplete query results to DO. We divide time作者: placebo 時間: 2025-3-27 14:44
ARM-Based Privacy Preserving for Medical Data Publishingcts people’s attention. Among these, we are particularly interested in the privacy preserving for association rule mining (ARM). In this paper, we improve the traditional reconstruction-based privacy preserving data mining (PPDM) and propose a new architecture for medical data publishing with privac作者: antiquated 時間: 2025-3-27 21:23 作者: 政府 時間: 2025-3-27 23:28 作者: 大都市 時間: 2025-3-28 04:52
Complete Separable Reversible Data Hiding in Encrypted Imagemage authentication, content owner identification and privacy protection. But there is one key problem of many existing published works, that the embedded data only can be extracted either before or after image decryption. In this paper, a complete separable reversible data hiding scheme in encrypte作者: 胖人手藝好 時間: 2025-3-28 06:16
Multi-threshold Image Segmentation Through an Improved Quantum-Behaved Particle Swarm Optimization Al multi-threshold value, which in essence can be reduced to multi-objective optimization problem. The quantum particle-behaved swarm algorithm (QPSO) is an effective method to resolve the problem of this class. However in practice, we found the original QPSO has imperfections, such as the excessive 作者: IOTA 時間: 2025-3-28 13:31 作者: 真 時間: 2025-3-28 17:35
Coverless Information Hiding Method Based on the Chinese Mathematical Expressionexisting information hiding approaches so far have been very difficult to resist the detecting techniques in steganalysis based on statistical analysis. Based on the Chinese mathematical expression, an efficient method of coverless text information hiding is presented, which is a brand-new method fo作者: 食料 時間: 2025-3-28 20:43
Network Information Security Challenges and Relevant Strategic Thinking as Highlighted by “PRISM”g the global economic ecology. It follows that network security risk has also become one of the most severe economic and national security challenges confronted by various countries in the 21st Century. The recent “PRISM” event has exposed the weakness of the Chinese network information security. Gi作者: Monolithic 時間: 2025-3-29 02:04
A Lightweight and Dependable Trust Model for Clustered Wireless Sensor Networkst and low reliability, the existing trust models for wireless sensor networks can not satisfy these requirements. To take into account the issues, a lightweight and dependable trust model for clustered wireless sensor network is proposed in this paper, in which the fuzzy degree of nearness is adopte作者: 四目在模仿 時間: 2025-3-29 05:20 作者: SLUMP 時間: 2025-3-29 08:15 作者: Connotation 時間: 2025-3-29 14:24
Analyzing Eventual Leader Election Protocols for Dynamic Systems by Probabilistic Model Checkingign and analyze these protocols in the dynamic setting, due to its high uncertainty, where typical properties include the average steps of electing a leader eventually, the scalability etc. In this paper, we propose a novel model-based approach for analyzing leader election protocols of dynamic syst作者: Excise 時間: 2025-3-29 17:10 作者: grenade 時間: 2025-3-29 21:11
Eva Derndorfer,Elisabeth Buchingery preserving, and we present a sanitization algorithm for the sensitive rules hiding. In this architecture, the sensitive rules are strictly controlled as well as the side effects are minimized. And finally we performed an experiment to evaluate the proposed architecture.作者: Deadpan 時間: 2025-3-30 01:24 作者: 哥哥噴涌而出 時間: 2025-3-30 05:13 作者: 手榴彈 時間: 2025-3-30 11:24
https://doi.org/10.1007/978-3-662-25063-1er domain and the plaintext domain. Moreover, the proposed method is simpler to calculate, while offering better performance. The results demonstrate that larger payload, better image quality, and error-free data extraction as well as image recovery are achieved.作者: CREST 時間: 2025-3-30 13:18
,Die gebr?uchlichen Schaltungen,ate the speed of convergence, we proposed an improved quantum-behaved particle swarm algorithm (IQPSO). The experiments showed that IQPSO was superior to PSO and QPSO on the searching of multi-threshold value in image segmentation under the premise of ensuring the accuracy of solutions.作者: intertwine 時間: 2025-3-30 16:33 作者: 有助于 時間: 2025-3-30 21:46 作者: 噱頭 時間: 2025-3-31 01:49 作者: nitric-oxide 時間: 2025-3-31 07:01
A Provably Secure Ciphertext-Policy Hierarchical Attribute-Based Encryptionibute-based encryption and provide a more expressive description of the access control structure. The security of the proposed CP-HABE scheme is proved in the standard model on the basis of decisional . parallel-BDHE assumption. Also the performance analysis is provided.作者: dialect 時間: 2025-3-31 11:07
Complete Separable Reversible Data Hiding in Encrypted Imageer domain and the plaintext domain. Moreover, the proposed method is simpler to calculate, while offering better performance. The results demonstrate that larger payload, better image quality, and error-free data extraction as well as image recovery are achieved.作者: 易發(fā)怒 時間: 2025-3-31 13:27 作者: 冷淡周邊 時間: 2025-3-31 18:20
Coverless Information Hiding Method Based on the Chinese Mathematical Expressionrmal text that includes the stego-vector will be retrieved, which means that the secret messages can be send to the receiver without any modification for the stego-text. Therefore, this method is robust for any current steganalysis algorithm, and it has a great value in theory and practical significance.作者: yohimbine 時間: 2025-3-31 22:11
The Optimization Model of Trust for White-Washingr experimental results show that the proposed model can insulate suspicious white-washing nodes effectively, and ensures the normal interaction activities among normal nodes at the same time. Thus, the proposed model can resist the white-washing attacks effectively.作者: 宣傳 時間: 2025-4-1 05:17 作者: cartilage 時間: 2025-4-1 09:44 作者: Project 時間: 2025-4-1 11:14
Malware Clustering Based on SNN Density Using System Callsdata mining. This makes it is a better application in the process of clustering of malware. The results of clusters demonstrate that the effect of the algorithm of clustering is good. And the algorithm is simple to implement and easy to complete automated analysis. It can be applied to actual automated analysis of malware.作者: Mammal 時間: 2025-4-1 15:45 作者: Antigen 時間: 2025-4-1 20:21