派博傳思國(guó)際中心

標(biāo)題: Titlebook: Communications and Multimedia Security; 11th IFIP TC 6/TC 11 Bart Decker,Ingrid Schaumüller-Bichl Conference proceedings 2010 IFIP Internat [打印本頁(yè)]

作者: mortality    時(shí)間: 2025-3-21 17:00
書目名稱Communications and Multimedia Security影響因子(影響力)




書目名稱Communications and Multimedia Security影響因子(影響力)學(xué)科排名




書目名稱Communications and Multimedia Security網(wǎng)絡(luò)公開度




書目名稱Communications and Multimedia Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Communications and Multimedia Security被引頻次




書目名稱Communications and Multimedia Security被引頻次學(xué)科排名




書目名稱Communications and Multimedia Security年度引用




書目名稱Communications and Multimedia Security年度引用學(xué)科排名




書目名稱Communications and Multimedia Security讀者反饋




書目名稱Communications and Multimedia Security讀者反饋學(xué)科排名





作者: 聲明    時(shí)間: 2025-3-21 23:12
The Role of Nitrous Oxide on Climate Change, implementing information security management systems. The same business excitement can be heard in other Asian, North American, European and Middleeastern countries. So what is this buzz all about? Quite simply implementing information security policies that enable businesses to do well, to take bu
作者: paltry    時(shí)間: 2025-3-22 00:48

作者: 染色體    時(shí)間: 2025-3-22 05:20
Dirk Ansorge,Richard John Godwinr the logical fusion of digital evidence that is often fragmented across disparate mobile assets. This, in turn, often requires the reconstruction of mobility patterns. However, real-time surveillance is often difficult and costly to conduct, especially in criminal scenarios where such process needs
作者: 乏味    時(shí)間: 2025-3-22 09:21
S. Fountas,T. A. Gemtos,S. Blackmoreechnologies such as JavaScript are vulnerable to so-called drive-by downloads. Drive-by downloads are able to automatically infect a victim’s system during a single visit of a crafted web page testing various vulnerabilities and installing e.g. malware files or illegal content without user interacti
作者: 罵人有污點(diǎn)    時(shí)間: 2025-3-22 13:01
Daniele Pochi,Roberto Fanigliuloequate security and privacy solutions are imperative in order to build and maintain trust in such extensible social platforms. This paper discusses security issues in the context of OpenSocial-instrumented social networking services. It shows that the OpenSocial specification is far from being compr
作者: 罵人有污點(diǎn)    時(shí)間: 2025-3-22 17:54
Daniele Pochi,Roberto Fanigliulotribution, an object can be transformed into a . which contains encrypted and/or signed parts according to an assigned security policy. The serialization of secured objects results in XML data which is protected by standard XML security means. Thus, this approach introduces a data-oriented security
作者: 單挑    時(shí)間: 2025-3-22 21:27
https://doi.org/10.1007/978-3-319-42655-6stamp information are embedded in individual video frames and decoded from a single frame captured from a display device, allowing to remember (’bookmark’) scenes in the video. We propose a simple watermarking scheme and blind image registration to combat the inherent geometric distortion due to dig
作者: 馬籠頭    時(shí)間: 2025-3-23 03:22

作者: Ibd810    時(shí)間: 2025-3-23 09:36

作者: 群島    時(shí)間: 2025-3-23 10:02
https://doi.org/10.1007/978-3-642-14225-3y applications due to related effort and the quantity of files..Based on existing work from [1] and [2] we analyse an approach towards statistical malware detection of PE executables. One benefit is its simplicity (evaluating 23 static features with moderate resource constrains), so it might support
作者: miniature    時(shí)間: 2025-3-23 16:25

作者: AMPLE    時(shí)間: 2025-3-23 21:53
Past, Present and Future in Soil Enzymology,of varying sizes and sectors to determine their continuity requirements in a comprehensive manner. Furthermore, the benchmark can be used to compare different business continuity methodologies, but also to identify an appropriate methodology that meets an organization’s requirements. This will help
作者: Dorsal    時(shí)間: 2025-3-24 01:42
José Manuel Mirás Avalos,Patricia Sande Fouzw costs and flexible services. However, VoIP calling anonymity, particularly to withhold “who called whom”, is difficult to achieve since VoIP infrastructures are usually deployed in an open networking environment (e.g., the Internet). Our work studies an anonymisation overlay network (AON) based so
作者: figment    時(shí)間: 2025-3-24 03:22

作者: Neuralgia    時(shí)間: 2025-3-24 06:45
D. T. Favis-Mortlock,A. J. T. Guerrao distinguish the threats and the applicable protection mechanisms depending on the underlying VoIP architecture. We then investigate the properties of a specific class of existing call establishment mechanisms based on tokens or tickets. In the last section, an enhancement to these mechanisms is pr
作者: 擴(kuò)音器    時(shí)間: 2025-3-24 13:43

作者: Spartan    時(shí)間: 2025-3-24 18:49

作者: 惰性女人    時(shí)間: 2025-3-24 20:24
St. Hergarten,G. Paul,H. J. Neugebaueristing approaches to iris-biometric cryptosystems the proposed scheme does not store any biometric data, neither in raw nor in encrypted form, providing high secrecy in terms of template protection. The proposed approach is tested on a widely used database revealing key generation rates above 95%.
作者: 組裝    時(shí)間: 2025-3-24 23:23
Wind Erosion Biological Control,eir plain form, such schemes are designed for documents having an unspecific structure, i.e. documents are simply considered as binary strings. In this work, we generalize the concept of redactable signatures towards documents that inherently provide a structure and investigate the security of our c
作者: 泥土謙卑    時(shí)間: 2025-3-25 03:58
https://doi.org/10.1007/978-3-642-13241-4RFID; access control; anomaly detection; cryptography; digital watermarking; identity management; localize
作者: 集中營(yíng)    時(shí)間: 2025-3-25 10:58
978-3-642-13240-7IFIP International Federation for Information Processing 2010
作者: Diaphragm    時(shí)間: 2025-3-25 13:45

作者: 易怒    時(shí)間: 2025-3-25 18:54

作者: 背心    時(shí)間: 2025-3-25 22:26

作者: 嚴(yán)厲批評(píng)    時(shí)間: 2025-3-26 02:22

作者: 越自我    時(shí)間: 2025-3-26 07:39

作者: 記成螞蟻    時(shí)間: 2025-3-26 12:17

作者: follicle    時(shí)間: 2025-3-26 13:06

作者: entreat    時(shí)間: 2025-3-26 18:12

作者: flourish    時(shí)間: 2025-3-26 22:46

作者: 易碎    時(shí)間: 2025-3-27 01:33

作者: 現(xiàn)實(shí)    時(shí)間: 2025-3-27 06:34

作者: 禍害隱伏    時(shí)間: 2025-3-27 13:23
Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-Walkingently trade-off security for efficiency and can be adjusted to the desired level of security. The relationship between the encryption of regular languages and the encryption of JPEG2000 bitstreams is established. Block-based cycle-walking for the regular language of JPEG2000 bitstreams is compared t
作者: 隱語(yǔ)    時(shí)間: 2025-3-27 16:44
Statistical Detection of Malicious PE-Executables for Fast Offline Analysisy applications due to related effort and the quantity of files..Based on existing work from [1] and [2] we analyse an approach towards statistical malware detection of PE executables. One benefit is its simplicity (evaluating 23 static features with moderate resource constrains), so it might support
作者: seduce    時(shí)間: 2025-3-27 20:34

作者: flavonoids    時(shí)間: 2025-3-28 01:02

作者: RAGE    時(shí)間: 2025-3-28 05:45
Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networksw costs and flexible services. However, VoIP calling anonymity, particularly to withhold “who called whom”, is difficult to achieve since VoIP infrastructures are usually deployed in an open networking environment (e.g., the Internet). Our work studies an anonymisation overlay network (AON) based so
作者: buoyant    時(shí)間: 2025-3-28 07:34
SIP Proxies: New Reflectors in the Internet, the design of the certificate distribution in this mechanism yields some vulnerabilities. In this paper, we investigate an attack which exploits SIP infrastructures as reflectors to bring down a web server. Our experiments demonstrate that the attacks can be easily mounted. Finally, we discuss som
作者: 該得    時(shí)間: 2025-3-28 14:29

作者: 南極    時(shí)間: 2025-3-28 15:44

作者: 炸壞    時(shí)間: 2025-3-28 18:57

作者: POWER    時(shí)間: 2025-3-28 22:56
Privacy Preserving Key Generation for Iris Biometricsisting approaches to iris-biometric cryptosystems the proposed scheme does not store any biometric data, neither in raw nor in encrypted form, providing high secrecy in terms of template protection. The proposed approach is tested on a widely used database revealing key generation rates above 95%.
作者: dictator    時(shí)間: 2025-3-29 03:20
Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcareeir plain form, such schemes are designed for documents having an unspecific structure, i.e. documents are simply considered as binary strings. In this work, we generalize the concept of redactable signatures towards documents that inherently provide a structure and investigate the security of our c
作者: 事先無準(zhǔn)備    時(shí)間: 2025-3-29 11:00
Dirk Ansorge,Richard John Godwinar, we realize that it is very likely that a reconstructed route of a target entity will contain gaps (due to missing trace data), so we try to probabilistically fill these gaps. This allows law enforcement agents to conduct off-line tracking while characterizing the quality of available evidence.
作者: 厚臉皮    時(shí)間: 2025-3-29 14:46
S. Fountas,T. A. Gemtos,S. Blackmoreg high-interaction systems. Further MonkeyWrench is able to identify the exact vulnerability triggered by a malicious page and to extract payloads from within obfuscated scripts which are valuable information to security analysts and researchers. Results of an examination of several hundred thousand
作者: 交響樂    時(shí)間: 2025-3-29 16:20
https://doi.org/10.1007/978-3-642-14225-3 better on the chosen setup than the general purpose statistical algorithms. Concluding, malicious samples often have special characteristics so existing malware-scanners can effectively be supported.
作者: 說明    時(shí)間: 2025-3-29 23:31

作者: 青少年    時(shí)間: 2025-3-30 00:50

作者: nettle    時(shí)間: 2025-3-30 05:00

作者: 惡意    時(shí)間: 2025-3-30 10:36
Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusionar, we realize that it is very likely that a reconstructed route of a target entity will contain gaps (due to missing trace data), so we try to probabilistically fill these gaps. This allows law enforcement agents to conduct off-line tracking while characterizing the quality of available evidence.
作者: Acetaldehyde    時(shí)間: 2025-3-30 14:53

作者: COST    時(shí)間: 2025-3-30 17:59
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis better on the chosen setup than the general purpose statistical algorithms. Concluding, malicious samples often have special characteristics so existing malware-scanners can effectively be supported.
作者: aggressor    時(shí)間: 2025-3-30 21:35

作者: Glucose    時(shí)間: 2025-3-31 04:53
Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruce positive recognitions, although they may not necessarily be visually similar. Our new approach for handwriting is based on genetic algorithms combined with user interaction in using a design vulnerability of the BioHash with an attack corresponding to cipher-text-only attack with side information
作者: 平常    時(shí)間: 2025-3-31 08:05
0302-9743 theft, and other security threats. Our real and virtual worlds are becoming increasingly vulnerable to attack. In order to encouragesecurity researchby both aca978-3-642-13240-7978-3-642-13241-4Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 增減字母法    時(shí)間: 2025-3-31 10:43
Keynotessiness opportunities that are profitable. These companies are all talking about implementing ISO/IEC 27001 the international standard on information security management which has become the common language for securing their business operations and engaging in profitable business relationships with their clients, customers and business partners.
作者: 興奮過度    時(shí)間: 2025-3-31 14:01

作者: 植物茂盛    時(shí)間: 2025-3-31 19:45

作者: Entreaty    時(shí)間: 2025-4-1 00:58

作者: 值得    時(shí)間: 2025-4-1 03:17
A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC) the authors merge observations, an analysis of existing definitions and results from prior surveys in the derivation of a single-phrase definition. The definition is evaluated and improved through a survey among GRC professionals. Finally a frame of reference for GRC research is constructed.
作者: filial    時(shí)間: 2025-4-1 07:02





歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
永寿县| 承德市| 荣昌县| 嵊州市| 金塔县| 定结县| 淳安县| 万源市| 偏关县| 太康县| 白河县| 靖州| 绥滨县| 永泰县| 闽侯县| 深泽县| 精河县| 尖扎县| 宜良县| 四会市| 南部县| 神农架林区| 安新县| 留坝县| 合川市| 迁安市| 华宁县| 葫芦岛市| 甘德县| 嵊州市| 红原县| 闸北区| 桑日县| 安吉县| 儋州市| 新营市| 三穗县| 永清县| 桐乡市| 盐城市| 信阳市|