標(biāo)題: Titlebook: e-Business and Telecommunications; 7th International Jo Mohammad S. Obaidat,George A. Tsihrintzis,Joaquim Conference proceedings 2012 Spri [打印本頁] 作者: Lensometer 時(shí)間: 2025-3-21 19:56
書目名稱e-Business and Telecommunications影響因子(影響力)
書目名稱e-Business and Telecommunications影響因子(影響力)學(xué)科排名
書目名稱e-Business and Telecommunications網(wǎng)絡(luò)公開度
書目名稱e-Business and Telecommunications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱e-Business and Telecommunications被引頻次
書目名稱e-Business and Telecommunications被引頻次學(xué)科排名
書目名稱e-Business and Telecommunications年度引用
書目名稱e-Business and Telecommunications年度引用學(xué)科排名
書目名稱e-Business and Telecommunications讀者反饋
書目名稱e-Business and Telecommunications讀者反饋學(xué)科排名
作者: Perennial長(zhǎng)期的 時(shí)間: 2025-3-21 20:28
Assessment of Measurement Modeleedback is extremely vulnerable to differential known IV attacks with practical complexities (2. time and 2. keystream). With such a feedback, it is shown that 16 out of 33 initialization rounds can be broken by a differential . IV attack. This is the first public evaluation result for this algorithm.作者: GOUGE 時(shí)間: 2025-3-22 00:32 作者: 以煙熏消毒 時(shí)間: 2025-3-22 04:38
Static Analysis of Routing and Firewall Policy Configurationsfect of routing on packets forwarding. Thus in the combination with reachability calculations based on packet filtering analysis it provides valuable information for a network designer on possible security issues in designed network.作者: 逢迎春日 時(shí)間: 2025-3-22 12:34
Differential Resynchronization Attacks on Reduced Round SNOW 3G?⊕eedback is extremely vulnerable to differential known IV attacks with practical complexities (2. time and 2. keystream). With such a feedback, it is shown that 16 out of 33 initialization rounds can be broken by a differential . IV attack. This is the first public evaluation result for this algorithm.作者: accessory 時(shí)間: 2025-3-22 14:01
Stream Cipher-Based Hash Function and Its SecurityHs and discuss the security on each phase of SCH; message injection, blank rounds, and hash generation. Finally we derive the necessary conditions on the stream cipher function for an SCH to be secure.作者: accessory 時(shí)間: 2025-3-22 17:19 作者: 松雞 時(shí)間: 2025-3-22 21:59
1865-0929 ta communication networking (DCNET), e-business (ICE-B), optical communication systems (OPTICS), security and cryptography (SECRYPT), signal processing and multimedia applications (SIGMAP), wireless information networks and systems (WINSYS).978-3-642-25205-1978-3-642-25206-8Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Inveterate 時(shí)間: 2025-3-23 03:37 作者: verdict 時(shí)間: 2025-3-23 05:37
Principles of Digital Image Processing, to provide a unified, pervasive and future-proof all-optical solution. Bandwidth loads in excess of 5?Gb/s have been detected on the architecture, while being able to serve high-definition TV channels with ultra low latencies.作者: Odyssey 時(shí)間: 2025-3-23 10:51 作者: Parley 時(shí)間: 2025-3-23 16:06 作者: aspect 時(shí)間: 2025-3-23 18:55
Converged Optical Networks for Multimedia Distribution and Data Services in Hospitality Environments to provide a unified, pervasive and future-proof all-optical solution. Bandwidth loads in excess of 5?Gb/s have been detected on the architecture, while being able to serve high-definition TV channels with ultra low latencies.作者: 災(zāi)禍 時(shí)間: 2025-3-23 22:21 作者: 男學(xué)院 時(shí)間: 2025-3-24 02:42
Conference proceedings 2012ns, ICETE 2010, held in Athens, Greece, in July 2010. The 28 revised full papers presented together with 1 invited paper in this volume were carefully reviewed and selected from 422 initial submissions. They have passed two rounds of selection and improvement. According to the topics of the particul作者: 出血 時(shí)間: 2025-3-24 09:04 作者: Magnificent 時(shí)間: 2025-3-24 13:02
Setting the Stage for Interactionems to support Prosumers. d) Intelligence and interoperability are needed to address Prosumer activity and their highly customized product purchases. e) Technology platforms must rapidly and correctly adapt, provide widespread offerings and scale appropriately, in the context of changing situational作者: Muscularis 時(shí)間: 2025-3-24 15:39
Evaluation and Experience in Art,intness-threshold between nodes during the route discovery. A set of security mechanisms, based on the use of Watchdog and digital signature, are used to protect the route discovery process. The conducted simulation estimates the additional overhead, showing the efficiency of the algorithm.作者: 字的誤用 時(shí)間: 2025-3-24 21:04
Martin Falk,Sebastian Grottel,Guido Reinaswapping application was built on top of this Middleware. This application will detect when the device ran out of local memory and will automatically send selected files from the mobile device to an external storage server, freeing the mobile storage memory. To decide which files should be backed up作者: 緩和 時(shí)間: 2025-3-24 23:41 作者: crumble 時(shí)間: 2025-3-25 06:45 作者: 偽書 時(shí)間: 2025-3-25 10:29 作者: 解脫 時(shí)間: 2025-3-25 13:03
Media, Mediation and Interactive Media, performing the decision algorithm, and the other is a key for generating a dummy signature, which prevents a third party from convincing the property (2). We also define security requirements for the PDVS, and propose a PDVS scheme which satisfies all security requirements we define.作者: 棲息地 時(shí)間: 2025-3-25 16:04
Sum Aggregation in Sensor Networks While Preserving Confidentiality and Integrity作者: 割公牛膨脹 時(shí)間: 2025-3-25 21:12 作者: landmark 時(shí)間: 2025-3-26 03:52
Threshold Based Multipath Routing Algorithm in Mobile Adhoc and Sensor Networksintness-threshold between nodes during the route discovery. A set of security mechanisms, based on the use of Watchdog and digital signature, are used to protect the route discovery process. The conducted simulation estimates the additional overhead, showing the efficiency of the algorithm.作者: lesion 時(shí)間: 2025-3-26 05:30 作者: 平 時(shí)間: 2025-3-26 09:21 作者: BALK 時(shí)間: 2025-3-26 16:18
A Social Location-Based Emergency Service to Eliminate the Bystander Effectiscuss several ways to develop an emergency alert service as an industrial product which infers the social closeness of service participants from different sources of data. Also, we will discuss and compare approaches for the system design we considered while implementing a prototype. A feasibility 作者: 粗語 時(shí)間: 2025-3-26 17:21
Modelling Uncertain and Time-Dependent Security Labels in MLS Systemss paper we propose to model both security labels and clearances as time-varying probability distributions. We provide practical templates to model both uncertainty and temporally characterised dependencies, and show how these features can be naturally integrated into an access control framework base作者: Pessary 時(shí)間: 2025-3-26 22:24
Proxiable Designated Verifier Signature performing the decision algorithm, and the other is a key for generating a dummy signature, which prevents a third party from convincing the property (2). We also define security requirements for the PDVS, and propose a PDVS scheme which satisfies all security requirements we define.作者: outrage 時(shí)間: 2025-3-27 04:24 作者: 龍卷風(fēng) 時(shí)間: 2025-3-27 09:09
W. N. Gill,Y. W. Lee,K. K. Koo,R. Ananth with an approach to security analysis based on reachability calculations in dynamically routed networks. The contribution consists of proposing routing abstract model that enables to extend existing reachability analysis approaches to obtain a finer approximation. This approximation captures the ef作者: 一罵死割除 時(shí)間: 2025-3-27 10:20 作者: Nausea 時(shí)間: 2025-3-27 15:46 作者: tackle 時(shí)間: 2025-3-27 18:21
Martin Falk,Sebastian Grottel,Guido Reinagic developments allow them to run applications that generate a large number of files and, as a consequence, require a greater storage capacity. Unfortunately, the storage capacity on these devices has not grown at the pace that mobile applications require. Keeping files in external servers becomes 作者: 古老 時(shí)間: 2025-3-28 01:23
Fundamental Precause of CSE Crisis (FP3C)ems has been providing enterprise mobile health care information systems for various medical services in Germany for many years. Consequently, the need for a usable front-end for handwriting recognition, particularly for the use in ambulances was needed. While handwriting recognition has been a clas作者: FOLLY 時(shí)間: 2025-3-28 03:16 作者: 網(wǎng)絡(luò)添麻煩 時(shí)間: 2025-3-28 07:56 作者: 吹牛大王 時(shí)間: 2025-3-28 11:17 作者: 山間窄路 時(shí)間: 2025-3-28 15:22 作者: FICE 時(shí)間: 2025-3-28 19:24
https://doi.org/10.1007/978-1-4612-4226-0ve not yet been studied sufficiently. In this paper, we analyze the security of SCHs focusing on the stream cipher function. First, we propose a model of SCHs which consist of a pre-computation function and a stream cipher. Then, we show that attacks against a stream cipher can also be threats to SC作者: Legend 時(shí)間: 2025-3-28 23:52 作者: Oratory 時(shí)間: 2025-3-29 03:06 作者: 惰性女人 時(shí)間: 2025-3-29 09:30
https://doi.org/10.1007/978-3-642-25206-8context-aware computing; elliptic curve cryptography; middleware; quality of services; social network se作者: Blemish 時(shí)間: 2025-3-29 12:04 作者: MARS 時(shí)間: 2025-3-29 16:16
Communications in Computer and Information Sciencehttp://image.papertrans.cn/f/image/320164.jpg作者: Herpetologist 時(shí)間: 2025-3-29 21:53
978-3-642-25205-1Springer-Verlag GmbH Berlin Heidelberg 2012作者: RADE 時(shí)間: 2025-3-30 02:17 作者: 安裝 時(shí)間: 2025-3-30 07:29
e-Business Challenges and Directions: Important Themes from the First ICE-B Workshopsiness challenges and directions across four subject areas: a) e-Business applications and models, b) enterprise engineering, c) mobility, d) business collaboration and e-Services, and e) technology platforms. Quality Function Deployment (QFD) methods were used to gather, organize and evaluate theme作者: 細(xì)查 時(shí)間: 2025-3-30 11:18 作者: 變白 時(shí)間: 2025-3-30 15:06 作者: 不開心 時(shí)間: 2025-3-30 18:25
The Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices Whd symmetric cryptography to achieve authentication, confidentiality and message integrity. The flexibility of the TLS protocol regarding the algorithms used allows it to also run efficiently on mobile devices severely constrained in terms of available memory, computing power and energy. In this work作者: 灌輸 時(shí)間: 2025-3-30 22:25
Mobile Applications Middleware for File Swappinggic developments allow them to run applications that generate a large number of files and, as a consequence, require a greater storage capacity. Unfortunately, the storage capacity on these devices has not grown at the pace that mobile applications require. Keeping files in external servers becomes 作者: myriad 時(shí)間: 2025-3-31 01:32
Optimization of a Handwriting Recognition Algorithm for a Mobile Enterprise Health Information Systeems has been providing enterprise mobile health care information systems for various medical services in Germany for many years. Consequently, the need for a usable front-end for handwriting recognition, particularly for the use in ambulances was needed. While handwriting recognition has been a clas作者: 先兆 時(shí)間: 2025-3-31 05:50
A Social Location-Based Emergency Service to Eliminate the Bystander Effect of location-based services (LBS). While LBSs are mostly developed for supporting travel and navigation related application scenarios, in this contribution we want to motivate the use of mobile devices for personal safety services. The problem of getting help in a crowd has been addressed by researc作者: CARE 時(shí)間: 2025-3-31 09:29
Converged Optical Networks for Multimedia Distribution and Data Services in Hospitality Environmentsble to cope with the increasing bandwidth demands required to distribute high-definition video traffic. We propose the use of a converged optical network adapted to the specific needs of the hospitality environment, providing a future-proof and easy to manage solution based on optical fiber wiring,