派博傳思國際中心

標題: Titlebook: Communications and Multimedia Security; 15th IFIP TC 6/TC 11 Bart Decker,André Zúquete Conference proceedings 2014 IFIP International Feder [打印本頁]

作者: satisficer    時間: 2025-3-21 16:50
書目名稱Communications and Multimedia Security影響因子(影響力)




書目名稱Communications and Multimedia Security影響因子(影響力)學科排名




書目名稱Communications and Multimedia Security網(wǎng)絡公開度




書目名稱Communications and Multimedia Security網(wǎng)絡公開度學科排名




書目名稱Communications and Multimedia Security被引頻次




書目名稱Communications and Multimedia Security被引頻次學科排名




書目名稱Communications and Multimedia Security年度引用




書目名稱Communications and Multimedia Security年度引用學科排名




書目名稱Communications and Multimedia Security讀者反饋




書目名稱Communications and Multimedia Security讀者反饋學科排名





作者: Cubicle    時間: 2025-3-21 23:42

作者: 樹上結蜜糖    時間: 2025-3-22 01:58
https://doi.org/10.1007/978-0-585-31788-5extended to allow other functionalities. We target that vulnerability for the specific vendor system and present a proof of concept of the attack in a realistic scenario environment. For this we use an apparently inoffensive smartphone charging station like the one that is now common at public place
作者: LATER    時間: 2025-3-22 08:25
https://doi.org/10.1007/978-0-585-31788-5zation. No matter how strong the authentication system is, after the authentication phase, there is no continuous verification that user is still the same human being that successfully logged in, thus leaving the system unprotected. This paper presents a usable breakthrough approach for continuous a
作者: Climate    時間: 2025-3-22 12:24
https://doi.org/10.1007/978-0-585-31788-5el of data protection is often inadequate for corporate use. This paper presents a strategy for secure credential and data storage in Android. It is supplemented by a context-aware mechanism that restricts data availability according to predefined policies. Our approach protects stored data better t
作者: Project    時間: 2025-3-22 14:06
https://doi.org/10.1007/978-0-585-31788-5 security sector. APTs are cyber attacks executed by sophisticated and well-resourced adversaries targeting specific information in high-profile companies and governments, usually in a long term campaign involving different steps. To a significant extent, the academic community has neglected the spe
作者: Project    時間: 2025-3-22 20:24
https://doi.org/10.1007/978-0-585-31788-5 ultimately reputation is specifically at risk from Denial of Service forms as it is based on resource over-commitment..In this paper, we describe a stealthy randomised probing strategy to learn thresholds used in the process of taking migration decisions in the cloud (i.e.?reverse engineering of mi
作者: 暫時別動    時間: 2025-3-22 21:43

作者: separate    時間: 2025-3-23 05:05
https://doi.org/10.1007/978-0-585-31788-5gains more and more importance, identification and authentication in and across clouds play an increasing role in this domain too. Currently, existing web identity management models are often just mapped to the cloud domain. Besides, within recent years several cloud identity management models such
作者: malign    時間: 2025-3-23 09:30

作者: 使腐爛    時間: 2025-3-23 11:31
https://doi.org/10.1007/978-0-585-31788-5g complexity of network security systems (NSSs) there is a challenge to manage them in accordance with IS policies. Incorrect configurations of NSSs lead to outages and appearance of vulnerabilities in networks. Moreover, policy management is a time and resource consuming process, which takes signif
作者: 散布    時間: 2025-3-23 17:21

作者: innate    時間: 2025-3-23 19:34

作者: 連詞    時間: 2025-3-23 23:14
https://doi.org/10.1007/978-0-585-31788-5e that it enables participants to share services on a personal basis, unlike other overlay networks that provide a single service for all peers. Since the overlay network is not supposed to have central servers for managing a single service, its bootstrap and the direct communication among pairs of
作者: browbeat    時間: 2025-3-24 04:12

作者: FACET    時間: 2025-3-24 07:47

作者: minimal    時間: 2025-3-24 11:50

作者: 侵蝕    時間: 2025-3-24 17:20
978-3-662-44884-7IFIP International Federation for Information Processing 2014
作者: freight    時間: 2025-3-24 22:41
The Fundamental Principle of Breach Prevention it out and organizations are challenged to protect a growing quantity of valuable digital information against careless mishandling and malicious use. In addition, a growing list of legislative requirements adds to the ongoing task of protecting digital files and information.
作者: Demonstrate    時間: 2025-3-24 23:30

作者: DEVIL    時間: 2025-3-25 07:16
https://doi.org/10.1007/978-3-030-88739-1 it out and organizations are challenged to protect a growing quantity of valuable digital information against careless mishandling and malicious use. In addition, a growing list of legislative requirements adds to the ongoing task of protecting digital files and information.
作者: xanthelasma    時間: 2025-3-25 10:54

作者: circuit    時間: 2025-3-25 13:17
USB Connection Vulnerabilities on Android Smartphones: Default and Vendors’ Customizationsextended to allow other functionalities. We target that vulnerability for the specific vendor system and present a proof of concept of the attack in a realistic scenario environment. For this we use an apparently inoffensive smartphone charging station like the one that is now common at public place
作者: output    時間: 2025-3-25 18:59

作者: foreign    時間: 2025-3-25 23:13

作者: BRIBE    時間: 2025-3-26 02:00
A Study on Advanced Persistent Threats security sector. APTs are cyber attacks executed by sophisticated and well-resourced adversaries targeting specific information in high-profile companies and governments, usually in a long term campaign involving different steps. To a significant extent, the academic community has neglected the spe
作者: 征兵    時間: 2025-3-26 04:54

作者: 護身符    時間: 2025-3-26 09:36

作者: Buttress    時間: 2025-3-26 15:41
A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryptiongains more and more importance, identification and authentication in and across clouds play an increasing role in this domain too. Currently, existing web identity management models are often just mapped to the cloud domain. Besides, within recent years several cloud identity management models such
作者: 皺痕    時間: 2025-3-26 19:00
D–Shuffle for Prêt à Voterigned to be flexible, secure and to offer voters a familiar and easy voting experience. Secrecy of the vote in Prêt à Voter relies on encoding the vote using a randomized candidate list in the ballots. In a few variants of Prêt à Voter a verifiable shuffle was used in the ballot generation phase in
作者: 有特色    時間: 2025-3-26 22:05
An Approach to Information Security Policy Modeling for Enterprise Networksg complexity of network security systems (NSSs) there is a challenge to manage them in accordance with IS policies. Incorrect configurations of NSSs lead to outages and appearance of vulnerabilities in networks. Moreover, policy management is a time and resource consuming process, which takes signif
作者: 耕種    時間: 2025-3-27 03:41
Introduction to Attribute Based Searchable Encryption and the senders decide on a policy. The policy is a function of these attributes expressed as a predicate and determines, among the users of the system, who is eligible to decrypt and search the ciphertext. Only members who own sufficient attributes to satisfy that policy can send the server a vali
作者: 諷刺    時間: 2025-3-27 06:20
Risk Analysis of Physically Unclonable Functionslication areas. Keys are not stored permanently anymore, but generated as needed using unique “fingerprints” that are inherent in each device. Since PUFs are “noisy” functions responses generated by a certain PUF instantiation are error-prone and therefore highly sophisticated error correction is re
作者: Genome    時間: 2025-3-27 12:37

作者: Facet-Joints    時間: 2025-3-27 15:06
Enhancing Privacy with Quantum Networksany application scenarios. The fact that the security is implemented directly at the hardware level, and moreover, relies on the laws of physics instead of conjectured hardness assumptions, justifies the use of quantum security in many cases. Limitations include 100?km communication range and instal
作者: glacial    時間: 2025-3-27 20:35
The Fundamental Principle of Breach Prevention it out and organizations are challenged to protect a growing quantity of valuable digital information against careless mishandling and malicious use. In addition, a growing list of legislative requirements adds to the ongoing task of protecting digital files and information.
作者: ARBOR    時間: 2025-3-27 22:45

作者: 樂意    時間: 2025-3-28 04:47

作者: 換話題    時間: 2025-3-28 08:32
https://doi.org/10.1007/978-0-585-31788-5tity broker store or process sensitive data such as identity information in the cloud brings up new issues, in particular with respect to user’s privacy. To overcome these problems, we propose a new cloud identity management model based on the federation between different cloud identity brokers. The
作者: 纖細    時間: 2025-3-28 14:24
Soil as a Many Splendored Thing,ly on establishing an efficient oblivious transfer protocol. We present a bit-string quantum oblivious transfer protocol based on single-qubit rotations that can be implemented with current technology based on optics and whose security relies only on the laws of physics.
作者: 陰謀    時間: 2025-3-28 16:00

作者: 支柱    時間: 2025-3-28 20:34

作者: 饒舌的人    時間: 2025-3-29 00:11
A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryptiontity broker store or process sensitive data such as identity information in the cloud brings up new issues, in particular with respect to user’s privacy. To overcome these problems, we propose a new cloud identity management model based on the federation between different cloud identity brokers. The
作者: FIN    時間: 2025-3-29 07:09

作者: Neonatal    時間: 2025-3-29 10:47
0302-9743 y, CMS 2014, held in Aveiro, Portugal, in September 2014..The 4 revised full papers presented together with 6 short papers, 3 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 22 submissions. The papers are
作者: 后退    時間: 2025-3-29 14:27
https://doi.org/10.1007/978-0-585-31788-5em, who is eligible to decrypt and search the ciphertext. Only members who own sufficient attributes to satisfy that policy can send the server a valid search query. In our work we introduce the concept of a secure ABSE by defining the functionalities and the relevant security notions.
作者: Polydipsia    時間: 2025-3-29 17:50

作者: 薄膜    時間: 2025-3-29 21:54
Conference proceedings 2014posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on vulnerabilities and threats, identification and authentification, applied security.
作者: 增減字母法    時間: 2025-3-30 02:06

作者: MEAN    時間: 2025-3-30 07:38
https://doi.org/10.1007/978-0-585-31788-5uthentication with free typed text through the use of biometric techniques based on keystroke dynamics. Our main purpose is to achieve a reduction of the required sample size, while improving (or at least not worsen) precision performance, by adapting and improving parameters on a keystroke dynamics algorithm.
作者: 結果    時間: 2025-3-30 09:38
https://doi.org/10.1007/978-0-585-31788-5han iOS in case of device theft. Contrary to other Android-based solutions, we do not depend on device brand, hardware specs, price range or platform version. No modifications to the operating system are required. The proposed concepts are validated by a contextaware file management prototype.
作者: ANN    時間: 2025-3-30 12:43

作者: colloquial    時間: 2025-3-30 18:55

作者: Gastric    時間: 2025-3-30 20:41

作者: 協(xié)奏曲    時間: 2025-3-31 04:18





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
汤原县| 华容县| 宁强县| 娄烦县| 乐清市| 北川| 鄯善县| 都匀市| 正定县| 夏河县| 于田县| 龙里县| 南丰县| 洪泽县| 环江| 沙河市| 中西区| 元阳县| 缙云县| 平陆县| 凤庆县| 常州市| 两当县| 茌平县| 怀安县| 县级市| 钦州市| 成都市| 阳高县| 如皋市| 平原县| 革吉县| 绥化市| 荥阳市| 芒康县| 宜兰县| 清苑县| 赞皇县| 微博| 承德县| 张掖市|