標(biāo)題: Titlebook: Emerging Challenges for Security, Privacy and Trust; 24th IFIP TC 11 Inte Dimitris Gritzalis,Javier Lopez Conference proceedings 2009 IFIP [打印本頁(yè)] 作者: Daidzein 時(shí)間: 2025-3-21 19:17
書(shū)目名稱Emerging Challenges for Security, Privacy and Trust影響因子(影響力)
書(shū)目名稱Emerging Challenges for Security, Privacy and Trust影響因子(影響力)學(xué)科排名
書(shū)目名稱Emerging Challenges for Security, Privacy and Trust網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Emerging Challenges for Security, Privacy and Trust網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Emerging Challenges for Security, Privacy and Trust被引頻次
書(shū)目名稱Emerging Challenges for Security, Privacy and Trust被引頻次學(xué)科排名
書(shū)目名稱Emerging Challenges for Security, Privacy and Trust年度引用
書(shū)目名稱Emerging Challenges for Security, Privacy and Trust年度引用學(xué)科排名
書(shū)目名稱Emerging Challenges for Security, Privacy and Trust讀者反饋
書(shū)目名稱Emerging Challenges for Security, Privacy and Trust讀者反饋學(xué)科排名
作者: 寬宏大量 時(shí)間: 2025-3-21 22:26
https://doi.org/10.1007/978-3-642-60595-6e as a promising alternative to the traditional PSTN telephony. SPam over Internet Telephony (SPIT) is one potential source of future annoyance in VoIP. A common way to launch a SPIT attack is the use of an automated procedure (bot), which generates calls and produces audio advertisements. In this p作者: Ablation 時(shí)間: 2025-3-22 00:30 作者: blithe 時(shí)間: 2025-3-22 05:18 作者: 性學(xué)院 時(shí)間: 2025-3-22 10:09 作者: catagen 時(shí)間: 2025-3-22 16:41
Francesco Natale,Silvano Pupolin average Hamming distance and improved ROC is found as compared to the use of the default quantization table especially for low FAR. This leads to improved user convenience in case high security is required.作者: catagen 時(shí)間: 2025-3-22 19:12 作者: Generalize 時(shí)間: 2025-3-22 22:36 作者: 一起 時(shí)間: 2025-3-23 02:24 作者: SPER 時(shí)間: 2025-3-23 08:23 作者: aerobic 時(shí)間: 2025-3-23 09:46
https://doi.org/10.1007/978-1-84628-799-2her for it: We have developed a system that is able to detect executable files with embedded information through .. Our system uses statistical analysis of instruction set distribution to distinguish between files with no hidden information and files that have been modified with .. We have tested ou作者: pessimism 時(shí)間: 2025-3-23 14:01
Multimedia Database Management Systemsprivileged instructions among other security benefits. However, it is not necessarily bullet-proof — some recent publications have shown that Virtual Machine technology could potentially allow the installation of undetectable malware root kits. As a result, it was suggested that such virtualization 作者: 狂怒 時(shí)間: 2025-3-23 19:03 作者: 過(guò)時(shí) 時(shí)間: 2025-3-23 22:43 作者: motivate 時(shí)間: 2025-3-24 04:30 作者: micturition 時(shí)間: 2025-3-24 10:31
V. S. Subrahmanian,Satish K. Tripathiving alphabetic language homomorphisms can be used to derive security results for combined security solutions. A relatively simple example of the combination of two different authentication properties (device authentication using a trusted platform module and user authentication using SSL) are integ作者: 影響深遠(yuǎn) 時(shí)間: 2025-3-24 11:15
https://doi.org/10.1007/b138328er to abstract ., independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforceme作者: 不可磨滅 時(shí)間: 2025-3-24 18:47
https://doi.org/10.1007/978-3-322-84269-5clared confidentiality policy. Implementations of controlled query evaluation usually lack efficiency due to costly theorem prover calls. Suitably constrained controlled query evaluation can be implemented efficiently, but is not flexible enough from the perspective of database users and security ad作者: 證明無(wú)罪 時(shí)間: 2025-3-24 19:10
https://doi.org/10.1007/978-3-531-92283-6We present and analyze a design of an filtering system to block email phishing messages, combining reputation, authentication and classification mechanisms. We present simple economical model and analysis, showing sufficient conditions on the precision of the content-classifier, to make phishing unprofitable.作者: rectum 時(shí)間: 2025-3-25 01:54 作者: jabber 時(shí)間: 2025-3-25 03:32 作者: Gleason-score 時(shí)間: 2025-3-25 10:57 作者: Gullible 時(shí)間: 2025-3-25 12:02
978-3-642-10176-2IFIP International Federation for Information Processing 2009作者: affinity 時(shí)間: 2025-3-25 16:32 作者: 現(xiàn)實(shí) 時(shí)間: 2025-3-25 23:59 作者: 重疊 時(shí)間: 2025-3-26 03:58
https://doi.org/10.1007/978-1-4613-0463-0ing technology can be used to build tickets, a core concept of Identity Management Systems. Relying solely on the Trusted Platform Module we will demonstrate how this technology can be used in the context of Kerberos for an implementation variant of Identity Management.作者: opalescence 時(shí)間: 2025-3-26 06:35 作者: DAUNT 時(shí)間: 2025-3-26 10:40 作者: 口味 時(shí)間: 2025-3-26 16:16 作者: 舊病復(fù)發(fā) 時(shí)間: 2025-3-26 16:47 作者: 鋼盔 時(shí)間: 2025-3-26 22:14
cation instance. The model has a number of valuable properties, including flexibility and extensibility; it can be applied to different application contexts and support easy addition of new attributes and removal of obsolete ones.作者: jet-lag 時(shí)間: 2025-3-27 02:59 作者: cultivated 時(shí)間: 2025-3-27 07:13 作者: Meditate 時(shí)間: 2025-3-27 11:23
Flexible and Transparent User Authentication for Mobile Devicesls and providing automatic access with higher confidence levels. An evaluation of the framework is undertaken from an end-user perspective via a trial involving 27 participants. Whilst the findings raise concerns over education, privacy and intrusiveness, overall 92% of users felt the system offered作者: 違法事實(shí) 時(shí)間: 2025-3-27 14:42 作者: 突變 時(shí)間: 2025-3-27 18:07
A Generic Authentication LoA Derivation Modelcation instance. The model has a number of valuable properties, including flexibility and extensibility; it can be applied to different application contexts and support easy addition of new attributes and removal of obsolete ones.作者: 透明 時(shí)間: 2025-3-27 22:44 作者: Daily-Value 時(shí)間: 2025-3-28 05:16 作者: 引水渠 時(shí)間: 2025-3-28 08:35 作者: 別炫耀 時(shí)間: 2025-3-28 13:53 作者: flamboyant 時(shí)間: 2025-3-28 18:22
On the Security Validation of Integrated Security Solutionsrated. Using security-preserving language homomorphisms it is shown that previously proposed combinations of solutions do not satisfy the desired integrated security properties. Finally, an improved integration of the two solutions is shown to satisfy the desired properties.作者: 臥虎藏龍 時(shí)間: 2025-3-28 20:23
Optimization of the Controlled Evaluation of Closed Relational Queriesministrators. In this paper, we propose an optimized framework for controlled query evaluation in relational databases, being efficiently implementable on the one hand and relaxing the constraints of previous approaches on the other hand.作者: absolve 時(shí)間: 2025-3-28 23:34
Conference proceedings 2009 tradition for - formation security professionals around the world. SEC 2009 was organized by the Technical Committee 11 (TC-11) of IFIP, and took place in Pafos, Cyprus, during May 18–20, 2009. It is an indication of good fortune for a Chair to serve a conference that takes place in a country with 作者: enflame 時(shí)間: 2025-3-29 04:39 作者: 很像弓] 時(shí)間: 2025-3-29 08:00 作者: Occupation 時(shí)間: 2025-3-29 13:02 作者: LAITY 時(shí)間: 2025-3-29 19:00
On the IPP Properties of Reed-Solomon Codesper, we show that for Reed-Solomon codes both properties are in many cases equivalent. More precisely, we show that for an [.,.,.] Reed-Solomon code, defined over a field that contains the .???. roots of unity, both properties are equivalent. This answers a question posted by Silverberg et al. in [10,11], for a large family of Reed-Solomon codes.作者: 阻塞 時(shí)間: 2025-3-29 22:57 作者: 斗志 時(shí)間: 2025-3-30 00:41 作者: 一起 時(shí)間: 2025-3-30 06:49 作者: Meager 時(shí)間: 2025-3-30 11:52
https://doi.org/10.1007/978-1-84628-799-2r algorithm against a mix of . and stego-executable files. The proposed distinguisher is able to tell apart these files with a 0 ratio of false positives and negatives, thus detecting all files with hidden information through ..作者: Isthmus 時(shí)間: 2025-3-30 15:56 作者: 幻想 時(shí)間: 2025-3-30 19:12
https://doi.org/10.1007/978-3-322-84269-5ministrators. In this paper, we propose an optimized framework for controlled query evaluation in relational databases, being efficiently implementable on the one hand and relaxing the constraints of previous approaches on the other hand.作者: 致命 時(shí)間: 2025-3-30 21:12
https://doi.org/10.1007/978-3-642-60595-6IP environments and we implement it in a SIP-based VoIP environment. Furthermore, we suggest and evaluate the specific attributes that audio CAPTCHA should incorporate in order to be effective, and test it against an open source bot implementation.作者: 條約 時(shí)間: 2025-3-31 01:42 作者: initiate 時(shí)間: 2025-3-31 05:48 作者: 災(zāi)難 時(shí)間: 2025-3-31 09:59 作者: ABHOR 時(shí)間: 2025-3-31 14:14 作者: 遺產(chǎn) 時(shí)間: 2025-3-31 19:28 作者: 貧窮地活 時(shí)間: 2025-3-31 21:59
On the Impossibility of Detecting Virtual Machine Monitorsoblem: . We prove here that, under a classical VM model, this problem is not decidable. Further, although our result seems to be quite theoretic, we also show that it has practical implications on related virtualization problems.作者: 英寸 時(shí)間: 2025-4-1 02:33
Verification of Security Policy Enforcement in Enterprise Systemsgin permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.作者: 最有利 時(shí)間: 2025-4-1 09:50 作者: 夾死提手勢(shì) 時(shí)間: 2025-4-1 13:41
Multimedia Document Systems in Perspectivesnditions, our axiomatic as well as inference rules. We also give a representative use case with our specification of recommendation requirements. Finally, we explain how our logical framework could be used to query the security policy and to check its consistency.