標題: Titlebook: Information Security and Privacy; 21st Australasian Co Joseph K. Liu,Ron Steinfeld Conference proceedings 2016 Springer International Publi [打印本頁] 作者: 生長變吼叫 時間: 2025-3-21 18:21
書目名稱Information Security and Privacy影響因子(影響力)
書目名稱Information Security and Privacy影響因子(影響力)學科排名
書目名稱Information Security and Privacy網(wǎng)絡公開度
書目名稱Information Security and Privacy網(wǎng)絡公開度學科排名
書目名稱Information Security and Privacy被引頻次
書目名稱Information Security and Privacy被引頻次學科排名
書目名稱Information Security and Privacy年度引用
書目名稱Information Security and Privacy年度引用學科排名
書目名稱Information Security and Privacy讀者反饋
書目名稱Information Security and Privacy讀者反饋學科排名
作者: 大廳 時間: 2025-3-21 23:00 作者: PARA 時間: 2025-3-22 02:45 作者: adequate-intake 時間: 2025-3-22 04:44 作者: 高興去去 時間: 2025-3-22 10:15 作者: deadlock 時間: 2025-3-22 16:51 作者: 共和國 時間: 2025-3-22 20:12 作者: glacial 時間: 2025-3-22 23:11
Min Cherng Lee,Robin Mitra,Emmanuel Lazaridis,An Chow Lai,Yong Kheng Goh,Wun-She Yap personal and social import. This book engages a community of critical voices in an age where critical storytelling has never mattered more.“Critical Storytellling in Uncritical Times is a pulsating work of self and social discovery, where autoethnographic accounts of high school students, pre-servi作者: Left-Atrium 時間: 2025-3-23 01:36 作者: 無聊的人 時間: 2025-3-23 06:42
Alastair Nisbet,Andrew Woodward personal and social import. This book engages a community of critical voices in an age where critical storytelling has never mattered more.“Critical Storytellling in Uncritical Times is a pulsating work of self and social discovery, where autoethnographic accounts of high school students, pre-servi作者: 使?jié)M足 時間: 2025-3-23 12:06
personal and social import. This book engages a community of critical voices in an age where critical storytelling has never mattered more.“Critical Storytellling in Uncritical Times is a pulsating work of self and social discovery, where autoethnographic accounts of high school students, pre-servi作者: analogous 時間: 2025-3-23 13:53 作者: Glutinous 時間: 2025-3-23 18:24 作者: 獸皮 時間: 2025-3-24 00:31 作者: 有花 時間: 2025-3-24 06:18 作者: 魅力 時間: 2025-3-24 07:42
Patrick McCorry,Malte M?ser,Siamak F. Shahandasti,Feng Haoere critical storytelling has never mattered more.“Critical Storytellling in Uncritical Times is a pulsating work of self and social discovery, where autoethnographic accounts of high school students, pre-servi978-94-6351-005-9Series ISSN 2213-722X Series E-ISSN 2213-7238 作者: 本能 時間: 2025-3-24 11:21
ere critical storytelling has never mattered more.“Critical Storytellling in Uncritical Times is a pulsating work of self and social discovery, where autoethnographic accounts of high school students, pre-servi978-94-6351-005-9Series ISSN 2213-722X Series E-ISSN 2213-7238 作者: 背叛者 時間: 2025-3-24 15:52 作者: 疲憊的老馬 時間: 2025-3-24 22:38
ere critical storytelling has never mattered more.“Critical Storytellling in Uncritical Times is a pulsating work of self and social discovery, where autoethnographic accounts of high school students, pre-servi978-94-6351-005-9Series ISSN 2213-722X Series E-ISSN 2213-7238 作者: 調(diào)情 時間: 2025-3-25 01:11 作者: 易于出錯 時間: 2025-3-25 03:56
ere critical storytelling has never mattered more.“Critical Storytellling in Uncritical Times is a pulsating work of self and social discovery, where autoethnographic accounts of high school students, pre-servi978-94-6351-005-9Series ISSN 2213-722X Series E-ISSN 2213-7238 作者: LVAD360 時間: 2025-3-25 10:44
Rui Xu,Kirill Morozov,Yanjiang Yang,Jianying Zhou,Tsuyoshi Takagiere critical storytelling has never mattered more.“Critical Storytellling in Uncritical Times is a pulsating work of self and social discovery, where autoethnographic accounts of high school students, pre-servi978-94-6351-005-9Series ISSN 2213-722X Series E-ISSN 2213-7238 作者: 婚姻生活 時間: 2025-3-25 15:29 作者: ABIDE 時間: 2025-3-25 17:53 作者: glucagon 時間: 2025-3-25 21:34
Conference proceedings 2016yption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random/One-Way Function..作者: glowing 時間: 2025-3-26 01:42 作者: implore 時間: 2025-3-26 05:56
uthor. By making themselves vulnerable, participants investigated stories that mattered to them. This book engages a community of critical voices in an uncritical age.".978-94-6300-256-1Series ISSN 2213-722X Series E-ISSN 2213-7238 作者: APRON 時間: 2025-3-26 11:54
Shuang Zhao,Xiapu Luo,Bo Bai,Xiaobo Ma,Wei Zou,Xinliang Qiu,Man Ho Auuthor. By making themselves vulnerable, participants investigated stories that mattered to them. This book engages a community of critical voices in an uncritical age.".978-94-6300-256-1Series ISSN 2213-722X Series E-ISSN 2213-7238 作者: kidney 時間: 2025-3-26 12:41
https://doi.org/10.1007/978-3-319-40253-6cloud services security; cryptography; mathematical foundations of cryptography; security engineering; s作者: 沙草紙 時間: 2025-3-26 19:33 作者: Stable-Angina 時間: 2025-3-26 22:24 作者: 注意力集中 時間: 2025-3-27 04:36 作者: 干涉 時間: 2025-3-27 05:40 作者: conservative 時間: 2025-3-27 11:08 作者: Criteria 時間: 2025-3-27 14:07 作者: condemn 時間: 2025-3-27 21:46 作者: Arboreal 時間: 2025-3-27 22:18
0302-9743 onference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016.?The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully revised and selected from 176 submissions. The papers of Part I (LNCS 9722)作者: 爆炸 時間: 2025-3-28 05:25
A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Gridsion which is a more realistic model and widely employed in a real smart grid environment. We summarize and categorize all possible attacks, and review the mechanisms behind. We also briefly talk about the countermeasures. We hope that the community would be able to come up with a better protection scheme for smart grids.作者: 典型 時間: 2025-3-28 10:20
On the Guessability of Resident Registration Numbers in South Koreaame and RRN pairs collected from several Chinese websites such as Baidu. Our results show that about 4,892.5 trials are needed on average to correctly guess a RRN. Compared to the brute-force attack, our statistical-guessing attack, on average, runs about 6.74 times faster.作者: Cloudburst 時間: 2025-3-28 13:37 作者: exercise 時間: 2025-3-28 15:27
Privacy-Preserving ,-Nearest Neighbour Query on Outsourced Database data structure called .d-tree to achieve sublinear query complexity. In order to protect data access patterns, garbled circuits are used to simulate Oblivious RAM (ORAM) for accessing data in the .d-tree. Compared to the existing solutions, our scheme imposes little overhead on both the data owner and the querying client.作者: Ossification 時間: 2025-3-28 21:13 作者: Wernickes-area 時間: 2025-3-29 01:56 作者: 流浪者 時間: 2025-3-29 06:50 作者: Noisome 時間: 2025-3-29 09:37
A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Gridsormation from smart meters would be used to perform a state estimation in real time in order to maintain the stability of the system. A wrong estimation can lead to diastrous consequences (e.g. suspension of electricity supply or a big financial loss). Unfortunately, quite a number of recent results作者: 保守黨 時間: 2025-3-29 11:33 作者: Malfunction 時間: 2025-3-29 19:00 作者: Retrieval 時間: 2025-3-29 21:55 作者: 同時發(fā)生 時間: 2025-3-30 01:34 作者: 宿醉 時間: 2025-3-30 06:39
On the Guessability of Resident Registration Numbers in South Koreas are required to enter their Resident Registration Number (RRN) to identify themselves. We adapt guessing theory techniques to measure RRN security against a trawling attacker attempting to guess victim’s RRN using some personal information (such as name, sex, and location) that are publicly availa作者: 誘導 時間: 2025-3-30 10:23
Towards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained nvenient personalized services but also incurs privacy concerns. To balance utility and privacy, many privacy-preserving mechanisms such as differential privacy have been proposed. However, most existent solutions set a single privacy protection level across the network, which does not well meet use作者: FEAS 時間: 2025-3-30 15:05
Fair Client Puzzles from the Bitcoin Blockchainalicious usage of resources. A typical problem of puzzle constructions is the difference in expected solving time on different computing platforms. We call puzzles which can be solved independently of client computing resources ...We propose a construction for client puzzles requiring widely distrib