標(biāo)題: Titlebook: Network and System Security; 8th International Co Man Ho Au,Barbara Carminati,C.-C. Jay Kuo Conference proceedings 2014 Springer Internatio [打印本頁] 作者: ONSET 時(shí)間: 2025-3-21 17:33
書目名稱Network and System Security影響因子(影響力)
書目名稱Network and System Security影響因子(影響力)學(xué)科排名
書目名稱Network and System Security網(wǎng)絡(luò)公開度
書目名稱Network and System Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Network and System Security被引頻次
書目名稱Network and System Security被引頻次學(xué)科排名
書目名稱Network and System Security年度引用
書目名稱Network and System Security年度引用學(xué)科排名
書目名稱Network and System Security讀者反饋
書目名稱Network and System Security讀者反饋學(xué)科排名
作者: 使聲音降低 時(shí)間: 2025-3-21 21:16
Jia Yan,Lingyun Ying,Yi Yang,Purui Su,Qi Li,Hui Kong,Dengguo Feng作者: Engulf 時(shí)間: 2025-3-22 00:40 作者: 想象 時(shí)間: 2025-3-22 08:12
Jakub Muszyński,Sébastien Varrette,Juan Luis Jiménez Laredo,Pascal Bouvry作者: 自負(fù)的人 時(shí)間: 2025-3-22 10:17 作者: insurgent 時(shí)間: 2025-3-22 15:39
Baodian Wei,Yusong Du,Huang Zhang,Fangguo Zhang,Haibo Tian,Chongzhi Gao作者: immunity 時(shí)間: 2025-3-22 19:15
psOBJ: Defending against Traffic Analysis with pseudo-Objectse and exhibits different traffic patterns in different visits. We have implemented a proof of concept prototype and validate the psOBJ countermeasure with some state of the art traffic analysis techniques.作者: DEFT 時(shí)間: 2025-3-22 23:14
Universally Composable Secure TNC Protocol Based on IF-T Binding to TLSon functionality which formalizes the integrity verification of a platform. We prove that the SKAE extension protocol and the basic TCG platform attestation protocol, both of which are defined by TCG specifications, UC-realizes the two primitive functionalities respectively. In the end, we introduce作者: 兒童 時(shí)間: 2025-3-23 02:10 作者: scrape 時(shí)間: 2025-3-23 09:04 作者: 不安 時(shí)間: 2025-3-23 10:10 作者: farewell 時(shí)間: 2025-3-23 17:15 作者: 協(xié)迫 時(shí)間: 2025-3-23 22:06 作者: 皺痕 時(shí)間: 2025-3-24 01:00
Dang Nguyen,Jaehong Park,Ravi Sandhuvon General Electric, Ford, Norgren, Motorola und Siemens. Für die vierte Auflage wurden neuere (Unternehmens-) Entwicklungen in die Beitr?ge eingearbeitet und au?erdem Zahlen, Texte und Abbildungen aktualisiert..978-3-540-48593-3作者: 牽連 時(shí)間: 2025-3-24 04:50
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/n/image/662885.jpg作者: Chipmunk 時(shí)間: 2025-3-24 07:24
https://doi.org/10.1007/978-3-319-11698-3P2P Botnet; Web page identification; access control; attribute-based signature; authentication; biometric作者: 和平主義 時(shí)間: 2025-3-24 11:50 作者: Valves 時(shí)間: 2025-3-24 15:30 作者: 蛛絲 時(shí)間: 2025-3-24 22:53
0302-9743 October 2014.The 35 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 155 initial submissions. The papers are organized in topical sections on cloud computing, access control, network security, security analysis, public key cryptography, system secu作者: 處理 時(shí)間: 2025-3-25 00:56 作者: 火光在搖曳 時(shí)間: 2025-3-25 06:24 作者: Abduct 時(shí)間: 2025-3-25 08:23
Hierarchical Solution for Access Control and Authentication in Software Defined Networksrosed scheme gains not only scalability, but also flexibility and fine-gained access control. Based on this we then present an authentication protocol for this special architecture to enhance the ability of controllers in SDN for managing the users, devices and data flows flexibly.作者: 強(qiáng)所 時(shí)間: 2025-3-25 14:12
A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computingcrypt the delegated data containing some keyword which matches the trapdoor from delegatee, (2) the proxy can only re-encrypt a limited number of delegated data to the delegatee; otherwise, the private key of the proxy will be exposed, and (3) the proxy cloud server learns nothing about the contents of data and keyword.作者: FILTH 時(shí)間: 2025-3-25 15:51
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classificationnd its performance benefit from both theoretical and empirical perspectives. A large number of experiments were implemented on the real-world traffic dataset. The results show that the performance of “small classes” can be improved significantly even only with small number of training data and the performance of “l(fā)arge classes” remains stable.作者: pellagra 時(shí)間: 2025-3-25 23:41
Exploiting the?Hard-Wired Vulnerabilities of?Newscast via?Connectivity-Splitting Attackers are able to defeat the protocol by breaking the network connectivity. Concrete experiments are performed using a framework that implements both the protocol and the cheating model considered in this work.作者: Abnormal 時(shí)間: 2025-3-26 01:24
Adopting Provenance-Based Access Control in OpenStack Cloud IaaSt a cloud service architecture that provides PBAC authorization service and management. We discuss in depth the variations of PBAC authorization deployment architecture within the OpenStack platform and implement a proof-of-concept prototype. We analyze the initial experimental results and discuss approaches for potential improvements.作者: 發(fā)生 時(shí)間: 2025-3-26 05:15
Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storagehe third party auditor (TPA) is able to verify the correctness of cloud data without the knowledge of mobile users’ identities during the data auditing process. We also analyze the security of the proposed protocol.作者: GRACE 時(shí)間: 2025-3-26 11:15 作者: 懸崖 時(shí)間: 2025-3-26 13:41 作者: 安裝 時(shí)間: 2025-3-26 17:21
An Approach for the Automated Analysis of Network Access Controls in Cloud Computing Infrastructurest an approach combining static and dynamic analyses, along with the analysis of discrepancies in the compared results. Our approach is sustained by experiments carried out on a VMware-based cloud platform.作者: 彈藥 時(shí)間: 2025-3-26 22:13
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration TechniquemCrypton-128 by adding some key-bridging techniques. The 8-round attack on mCrypton-128 requires a time complexity 2. and a memory complexity 2.. Furthermore, we construct a 5-round distinguisher and propose a MITM attack on 9-round mCrypton-128 with a time complexity of 2. encryptions and a memory complexity of 2. 64-bit blocks.作者: 帶傷害 時(shí)間: 2025-3-27 01:27 作者: lactic 時(shí)間: 2025-3-27 06:26 作者: 持久 時(shí)間: 2025-3-27 10:17
Identity Based Threshold Ring Signature from Latticesal graded Computational Deffie-Hellman problem .. Based on the hardness assumption of ., we construct the first ID-based threshold ring signature scheme from lattices. The scheme is proved in the random oracle model to be existentially unforgeable and signer anonymous.作者: gentle 時(shí)間: 2025-3-27 17:20 作者: STALE 時(shí)間: 2025-3-27 21:12
0302-9743 papers are organized in topical sections on cloud computing, access control, network security, security analysis, public key cryptography, system security, privacy-preserving systems and biometrics, and key management and distribution.978-3-319-11697-6978-3-319-11698-3Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Abrade 時(shí)間: 2025-3-27 23:30 作者: Chandelier 時(shí)間: 2025-3-28 05:46
Adopting Provenance-Based Access Control in OpenStack Cloud IaaSance various aspects of access control in a computing environment. The adoption of PBAC capabilities to the authorization engine of a multi-tenant cloud Infrastructure-as-a-Service (IaaS) such as OpenStack can enhance the access control capabilities of cloud systems. Toward this purpose, we introduc作者: 發(fā)生 時(shí)間: 2025-3-28 07:03 作者: exostosis 時(shí)間: 2025-3-28 12:24
A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Serviceand virtual local area networks (VLANs). It takes a complex process to manage and arrange these virtual resources to build particular computing environments. Misconfiguration of this management process increases possibility of security vulnerability in this system. Moreover, multiplexing virtual res作者: painkillers 時(shí)間: 2025-3-28 17:19
Extending OpenStack Access Control with Domain Trust response to increasing access control requirements from its users, the OpenStack identity service Keystone has introduced several entities, such as domains and projects in addition to roles, resulting in a rather complex and somewhat obscure authorization model. In this paper, we present a formaliz作者: 疾馳 時(shí)間: 2025-3-28 20:04 作者: Receive 時(shí)間: 2025-3-29 02:30
A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computingmputing, which combines the function of limited proxy re-encryption (LPRE) and that of public key encryption with keyword search (PEKS). However, an LPREKS scheme cannot be obtained by directly combining those two schemes since the resulting scheme is no longer proven secure in our security model. O作者: Hormones 時(shí)間: 2025-3-29 04:52
psOBJ: Defending against Traffic Analysis with pseudo-Objectsr. On the other hand, the server responses with required object contents. This makes the traffic of a specified web page demonstrate pattern features different from other pages. Traffic analysis techniques can extract these features to identify web pages effectively even if the traffic is encrypted.作者: Ligneous 時(shí)間: 2025-3-29 10:21 作者: 不理會(huì) 時(shí)間: 2025-3-29 14:01
Revisiting Node Injection of P2P Botnetnificant to enhance our understanding of unstructured P2P Botnets which prove to be resilient against various dismantle efforts. Node injection technique is quite effective in enumerating infected hosts from P2P Botnets, but no previous work has investigated the effectiveness of this method in a qua作者: Galactogogue 時(shí)間: 2025-3-29 19:16 作者: Colonnade 時(shí)間: 2025-3-29 20:04
Exploiting the?Hard-Wired Vulnerabilities of?Newscast via?Connectivity-Splitting Attack-to-peer data exchange protocol. The Newscast protocol forms an overlay network and keeps it connected by means of an epidemic algorithm, thus featuring a complex, spatially structured, and dynamically changing environment. It has recently become very popular due to its inherent resilience to node v作者: 谷物 時(shí)間: 2025-3-30 03:21
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Techniqueound distinguisher and lower the memory requirement from 2. to 2. using the differential enumeration technique. Based on the distinguisher, we launch a MITM attack on 7-round mCrypton-64/96/128 with complexities of 2. 64-bit blocks and 2. encryptions. Then we extend the basic attack to 8 rounds for 作者: 赤字 時(shí)間: 2025-3-30 07:45 作者: Anthropoid 時(shí)間: 2025-3-30 11:22
Cryptanalysis on the Authenticated Cipher Sablierntication Au. In this work we first present a state recovery attack against the encryption Sablier v1 with time complexity about 2. operations and data complexity about 24 of 16-bit key words, which is practical in a small workstation. Based on the above attack, we further deduce a key recovery atta作者: NICE 時(shí)間: 2025-3-30 12:52 作者: delegate 時(shí)間: 2025-3-30 17:58
Security Analysis and Improvement of Femtocell Access Controls. Typically, a femtocell is designed for use in a home or small business. In 2009, 3GPP (3rd Generation Partnership Program) announced and published the first femtocell standard. In this paper, we first point out that the user equipment (UE) registration procedure, which defined in 3GPP standard, i作者: superfluous 時(shí)間: 2025-3-30 22:03 作者: Coterminous 時(shí)間: 2025-3-31 03:38
Identity-Based Transitive Signcryptionpublic information can compose a signature on edge (., .). In all existing transitive signature schemes, to prevent signature exposure, a secure channel is required between the signer and the recipient to transfer the signature. To eliminate this need, in this paper we introduce a new notion called 作者: faultfinder 時(shí)間: 2025-3-31 08:12
ge und Ergebnisse in der Anwendung von Six Sigma.Fallbeispie.Six Sigma ist ein konsequentes Projektmanagement zum Analysieren von Qualit?tsproblemen und zu deren nachhaltiger Beseitigung auf der Basis statistischer Methoden und unter Einsatz g?ngiger fortschrittlicher Qualit?tsmanagement-Tools. Die 作者: lethal 時(shí)間: 2025-3-31 11:32
Thibaut Probst,Eric Alata,Mohamed Kaaniche,Vincent Nicomettege und Ergebnisse in der Anwendung von Six Sigma.Fallbeispie.Six Sigma ist ein konsequentes Projektmanagement zum Analysieren von Qualit?tsproblemen und zu deren nachhaltiger Beseitigung auf der Basis statistischer Methoden und unter Einsatz g?ngiger fortschrittlicher Qualit?tsmanagement-Tools. Die 作者: DOLT 時(shí)間: 2025-3-31 17:16 作者: EWER 時(shí)間: 2025-3-31 18:37 作者: Indecisive 時(shí)間: 2025-3-31 22:20
Sara Amadasi,Vittorio Iervesehe conducting of public life in cities..The book is divided into two sections. Drawing on classic and contemporary scholars on public space, and on digital culture, Section I explores the implications of the co978-3-030-66674-3978-3-030-66672-9Series ISSN 2365-757X Series E-ISSN 2365-7588 作者: MITE 時(shí)間: 2025-4-1 04:17
Die Open Graphics Library (OpenGL),eit sehr stark verbreitet hat. Sie wird durch die Treiber g?ngiger Grafikprozessoren und Grafikkarten und für die wesentlichen Betriebssysteme unterstützt. Nach einer kurzen übersicht über existierende Programmierschnittstellen für Grafikanwendungen sind in diesem Kapitel ausführlich die Grundlagen 作者: 生銹 時(shí)間: 2025-4-1 06:09
G. Scorza Dragonihere should be public support for such military operations, which is what concerns us here. More than in any earlier recent conflict, the question of the degree of public support for the various options and strategies available has taken a central place in the public debate and the calculations of d作者: 規(guī)章 時(shí)間: 2025-4-1 11:15