標題: Titlebook: Communications and Multimedia Security; 15th IFIP TC 6/TC 11 Bart Decker,André Zúquete Conference proceedings 2014 IFIP International Feder [打印本頁] 作者: satisficer 時間: 2025-3-21 16:50
書目名稱Communications and Multimedia Security影響因子(影響力)
書目名稱Communications and Multimedia Security影響因子(影響力)學科排名
書目名稱Communications and Multimedia Security網(wǎng)絡公開度
書目名稱Communications and Multimedia Security網(wǎng)絡公開度學科排名
書目名稱Communications and Multimedia Security被引頻次
書目名稱Communications and Multimedia Security被引頻次學科排名
書目名稱Communications and Multimedia Security年度引用
書目名稱Communications and Multimedia Security年度引用學科排名
書目名稱Communications and Multimedia Security讀者反饋
書目名稱Communications and Multimedia Security讀者反饋學科排名
作者: Cubicle 時間: 2025-3-21 23:42 作者: 樹上結蜜糖 時間: 2025-3-22 01:58
https://doi.org/10.1007/978-0-585-31788-5extended to allow other functionalities. We target that vulnerability for the specific vendor system and present a proof of concept of the attack in a realistic scenario environment. For this we use an apparently inoffensive smartphone charging station like the one that is now common at public place作者: LATER 時間: 2025-3-22 08:25
https://doi.org/10.1007/978-0-585-31788-5zation. No matter how strong the authentication system is, after the authentication phase, there is no continuous verification that user is still the same human being that successfully logged in, thus leaving the system unprotected. This paper presents a usable breakthrough approach for continuous a作者: Climate 時間: 2025-3-22 12:24
https://doi.org/10.1007/978-0-585-31788-5el of data protection is often inadequate for corporate use. This paper presents a strategy for secure credential and data storage in Android. It is supplemented by a context-aware mechanism that restricts data availability according to predefined policies. Our approach protects stored data better t作者: Project 時間: 2025-3-22 14:06
https://doi.org/10.1007/978-0-585-31788-5 security sector. APTs are cyber attacks executed by sophisticated and well-resourced adversaries targeting specific information in high-profile companies and governments, usually in a long term campaign involving different steps. To a significant extent, the academic community has neglected the spe作者: Project 時間: 2025-3-22 20:24
https://doi.org/10.1007/978-0-585-31788-5 ultimately reputation is specifically at risk from Denial of Service forms as it is based on resource over-commitment..In this paper, we describe a stealthy randomised probing strategy to learn thresholds used in the process of taking migration decisions in the cloud (i.e.?reverse engineering of mi作者: 暫時別動 時間: 2025-3-22 21:43 作者: separate 時間: 2025-3-23 05:05
https://doi.org/10.1007/978-0-585-31788-5gains more and more importance, identification and authentication in and across clouds play an increasing role in this domain too. Currently, existing web identity management models are often just mapped to the cloud domain. Besides, within recent years several cloud identity management models such 作者: malign 時間: 2025-3-23 09:30 作者: 使腐爛 時間: 2025-3-23 11:31
https://doi.org/10.1007/978-0-585-31788-5g complexity of network security systems (NSSs) there is a challenge to manage them in accordance with IS policies. Incorrect configurations of NSSs lead to outages and appearance of vulnerabilities in networks. Moreover, policy management is a time and resource consuming process, which takes signif作者: 散布 時間: 2025-3-23 17:21 作者: innate 時間: 2025-3-23 19:34 作者: 連詞 時間: 2025-3-23 23:14
https://doi.org/10.1007/978-0-585-31788-5e that it enables participants to share services on a personal basis, unlike other overlay networks that provide a single service for all peers. Since the overlay network is not supposed to have central servers for managing a single service, its bootstrap and the direct communication among pairs of 作者: browbeat 時間: 2025-3-24 04:12 作者: FACET 時間: 2025-3-24 07:47 作者: minimal 時間: 2025-3-24 11:50 作者: 侵蝕 時間: 2025-3-24 17:20
978-3-662-44884-7IFIP International Federation for Information Processing 2014作者: freight 時間: 2025-3-24 22:41
The Fundamental Principle of Breach Prevention it out and organizations are challenged to protect a growing quantity of valuable digital information against careless mishandling and malicious use. In addition, a growing list of legislative requirements adds to the ongoing task of protecting digital files and information.作者: Demonstrate 時間: 2025-3-24 23:30 作者: DEVIL 時間: 2025-3-25 07:16
https://doi.org/10.1007/978-3-030-88739-1 it out and organizations are challenged to protect a growing quantity of valuable digital information against careless mishandling and malicious use. In addition, a growing list of legislative requirements adds to the ongoing task of protecting digital files and information.作者: xanthelasma 時間: 2025-3-25 10:54 作者: circuit 時間: 2025-3-25 13:17
USB Connection Vulnerabilities on Android Smartphones: Default and Vendors’ Customizationsextended to allow other functionalities. We target that vulnerability for the specific vendor system and present a proof of concept of the attack in a realistic scenario environment. For this we use an apparently inoffensive smartphone charging station like the one that is now common at public place作者: output 時間: 2025-3-25 18:59 作者: foreign 時間: 2025-3-25 23:13 作者: BRIBE 時間: 2025-3-26 02:00
A Study on Advanced Persistent Threats security sector. APTs are cyber attacks executed by sophisticated and well-resourced adversaries targeting specific information in high-profile companies and governments, usually in a long term campaign involving different steps. To a significant extent, the academic community has neglected the spe作者: 征兵 時間: 2025-3-26 04:54 作者: 護身符 時間: 2025-3-26 09:36 作者: Buttress 時間: 2025-3-26 15:41
A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryptiongains more and more importance, identification and authentication in and across clouds play an increasing role in this domain too. Currently, existing web identity management models are often just mapped to the cloud domain. Besides, within recent years several cloud identity management models such 作者: 皺痕 時間: 2025-3-26 19:00
D–Shuffle for Prêt à Voterigned to be flexible, secure and to offer voters a familiar and easy voting experience. Secrecy of the vote in Prêt à Voter relies on encoding the vote using a randomized candidate list in the ballots. In a few variants of Prêt à Voter a verifiable shuffle was used in the ballot generation phase in 作者: 有特色 時間: 2025-3-26 22:05
An Approach to Information Security Policy Modeling for Enterprise Networksg complexity of network security systems (NSSs) there is a challenge to manage them in accordance with IS policies. Incorrect configurations of NSSs lead to outages and appearance of vulnerabilities in networks. Moreover, policy management is a time and resource consuming process, which takes signif作者: 耕種 時間: 2025-3-27 03:41
Introduction to Attribute Based Searchable Encryption and the senders decide on a policy. The policy is a function of these attributes expressed as a predicate and determines, among the users of the system, who is eligible to decrypt and search the ciphertext. Only members who own sufficient attributes to satisfy that policy can send the server a vali作者: 諷刺 時間: 2025-3-27 06:20
Risk Analysis of Physically Unclonable Functionslication areas. Keys are not stored permanently anymore, but generated as needed using unique “fingerprints” that are inherent in each device. Since PUFs are “noisy” functions responses generated by a certain PUF instantiation are error-prone and therefore highly sophisticated error correction is re作者: Genome 時間: 2025-3-27 12:37 作者: Facet-Joints 時間: 2025-3-27 15:06
Enhancing Privacy with Quantum Networksany application scenarios. The fact that the security is implemented directly at the hardware level, and moreover, relies on the laws of physics instead of conjectured hardness assumptions, justifies the use of quantum security in many cases. Limitations include 100?km communication range and instal作者: glacial 時間: 2025-3-27 20:35
The Fundamental Principle of Breach Prevention it out and organizations are challenged to protect a growing quantity of valuable digital information against careless mishandling and malicious use. In addition, a growing list of legislative requirements adds to the ongoing task of protecting digital files and information.作者: ARBOR 時間: 2025-3-27 22:45 作者: 樂意 時間: 2025-3-28 04:47 作者: 換話題 時間: 2025-3-28 08:32
https://doi.org/10.1007/978-0-585-31788-5tity broker store or process sensitive data such as identity information in the cloud brings up new issues, in particular with respect to user’s privacy. To overcome these problems, we propose a new cloud identity management model based on the federation between different cloud identity brokers. The作者: 纖細 時間: 2025-3-28 14:24
Soil as a Many Splendored Thing,ly on establishing an efficient oblivious transfer protocol. We present a bit-string quantum oblivious transfer protocol based on single-qubit rotations that can be implemented with current technology based on optics and whose security relies only on the laws of physics.作者: 陰謀 時間: 2025-3-28 16:00 作者: 支柱 時間: 2025-3-28 20:34 作者: 饒舌的人 時間: 2025-3-29 00:11
A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryptiontity broker store or process sensitive data such as identity information in the cloud brings up new issues, in particular with respect to user’s privacy. To overcome these problems, we propose a new cloud identity management model based on the federation between different cloud identity brokers. The作者: FIN 時間: 2025-3-29 07:09 作者: Neonatal 時間: 2025-3-29 10:47
0302-9743 y, CMS 2014, held in Aveiro, Portugal, in September 2014..The 4 revised full papers presented together with 6 short papers, 3 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 22 submissions. The papers are 作者: 后退 時間: 2025-3-29 14:27
https://doi.org/10.1007/978-0-585-31788-5em, who is eligible to decrypt and search the ciphertext. Only members who own sufficient attributes to satisfy that policy can send the server a valid search query. In our work we introduce the concept of a secure ABSE by defining the functionalities and the relevant security notions.作者: Polydipsia 時間: 2025-3-29 17:50 作者: 薄膜 時間: 2025-3-29 21:54
Conference proceedings 2014posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on vulnerabilities and threats, identification and authentification, applied security.作者: 增減字母法 時間: 2025-3-30 02:06 作者: MEAN 時間: 2025-3-30 07:38
https://doi.org/10.1007/978-0-585-31788-5uthentication with free typed text through the use of biometric techniques based on keystroke dynamics. Our main purpose is to achieve a reduction of the required sample size, while improving (or at least not worsen) precision performance, by adapting and improving parameters on a keystroke dynamics algorithm.作者: 結果 時間: 2025-3-30 09:38
https://doi.org/10.1007/978-0-585-31788-5han iOS in case of device theft. Contrary to other Android-based solutions, we do not depend on device brand, hardware specs, price range or platform version. No modifications to the operating system are required. The proposed concepts are validated by a contextaware file management prototype.作者: ANN 時間: 2025-3-30 12:43 作者: colloquial 時間: 2025-3-30 18:55 作者: Gastric 時間: 2025-3-30 20:41 作者: 協(xié)奏曲 時間: 2025-3-31 04:18