標題: Titlebook: Network and System Security; 6th International Co Li Xu,Elisa Bertino,Yi Mu Conference proceedings 2012 Springer-Verlag Berlin Heidelberg 2 [打印本頁] 作者: 搭話 時間: 2025-3-21 17:19
書目名稱Network and System Security影響因子(影響力)
書目名稱Network and System Security影響因子(影響力)學科排名
書目名稱Network and System Security網(wǎng)絡公開度
書目名稱Network and System Security網(wǎng)絡公開度學科排名
書目名稱Network and System Security被引頻次
書目名稱Network and System Security被引頻次學科排名
書目名稱Network and System Security年度引用
書目名稱Network and System Security年度引用學科排名
書目名稱Network and System Security讀者反饋
書目名稱Network and System Security讀者反饋學科排名
作者: Debark 時間: 2025-3-21 23:53 作者: Altitude 時間: 2025-3-22 02:21
Silvio Ranise,Alessandro Armandot d‘ un fluide parfait en régime subsonique et transsonique, a contribué á l‘ efficacité et la popularité des méthodes de relaxation. Pour des systémes du premier ordre et en particulier pour les équations d‘ Euler, ces schémas implicites n‘ ont pas permis jusqu‘ à présent d‘ aboutir á des méthodes 作者: Flinch 時間: 2025-3-22 05:59 作者: 雜役 時間: 2025-3-22 10:01 作者: Perennial長期的 時間: 2025-3-22 14:14 作者: Merited 時間: 2025-3-22 20:26 作者: Mercurial 時間: 2025-3-22 21:12 作者: 欺騙手段 時間: 2025-3-23 04:20
Shengli Liu,Fangguo Zhang,Kefei Chent d‘ un fluide parfait en régime subsonique et transsonique, a contribué á l‘ efficacité et la popularité des méthodes de relaxation. Pour des systémes du premier ordre et en particulier pour les équations d‘ Euler, ces schémas implicites n‘ ont pas permis jusqu‘ à présent d‘ aboutir á des méthodes 作者: exigent 時間: 2025-3-23 06:56 作者: 設(shè)施 時間: 2025-3-23 11:14
Fei Tang,Changlu Lin,Pinhui Ket d‘ un fluide parfait en régime subsonique et transsonique, a contribué á l‘ efficacité et la popularité des méthodes de relaxation. Pour des systémes du premier ordre et en particulier pour les équations d‘ Euler, ces schémas implicites n‘ ont pas permis jusqu‘ à présent d‘ aboutir á des méthodes 作者: 評論者 時間: 2025-3-23 15:41 作者: Fibrin 時間: 2025-3-23 20:16
Samaneh Mahdavifar,Mahdi Abadi,Mohsen Kahani,Hassan Mahdikhaniior than the inferior field. The authors found approximately 4 dB higher threshold sensitivity in the Humphrey than in the Octopus. This is probably due to variation in stimulus exposure time, 0.2 seconds in the Humphrey vs. 0.1 seconds in the Octopus. The effective development of screening devices 作者: THE 時間: 2025-3-23 23:50
Alif Wahid,Christopher Leckie,Chenfeng Zhous along the free boundary of the half-space made of damaged material, are studied. It is shown that, in contrast to the classical Rayleigh surface wave, a wave propagating along the boundary of the Cosserat half-space has dispersion. In the plane “phase velocity – frequency” for such waves, there ar作者: Brain-Waves 時間: 2025-3-24 05:00
Qi Han,Yinghui Zhang,Xiaofeng Chen,Hui Li,Jiaxiang Quanal and Physical Inquiries into the Foundations of Quantum Mechanics, convened at the Ettore Maj orana Centre for Scientific Culture, Erice, Sicily, 5-15 August 1989. In response to the high state of enth,usiasm from the sixty-one participants there were six to eight lectures each day, beginning at 9作者: 圣人 時間: 2025-3-24 08:14
Yifan Zhao,Swee-Won Lo,Robert H. Deng,Xuhua Dingal and Physical Inquiries into the Foundations of Quantum Mechanics, convened at the Ettore Maj orana Centre for Scientific Culture, Erice, Sicily, 5-15 August 1989. In response to the high state of enth,usiasm from the sixty-one participants there were six to eight lectures each day, beginning at 9作者: 猜忌 時間: 2025-3-24 14:28 作者: inferno 時間: 2025-3-24 15:31
Yue Yu,Michael Fry,Bernhard Plattner,Paul Smith,Alberto Schaeffer-Filhoel spectroscopies (based on X-ray absorption XAS and X-ray photoelectron spectroscopy XPS) on model systems implying deposition of magnetic metals (Fe, Co, Sm) on usual semiconductors (Si, GaAs, InAs). The Chapters begins with a review of the core level spectroscopies and of derived techniques, such作者: Confirm 時間: 2025-3-24 20:09 作者: habitat 時間: 2025-3-25 01:34 作者: 謙虛的人 時間: 2025-3-25 04:10
On the Automated Analysis of Safety in Usage Control: A New Decidability Resultr the decidability of the safety problem for UCON systems whose attributes are allowed to range over infinite domains and updates in one process may affect the state of another. Our result is a significant generalization of those available in the literature.作者: GEAR 時間: 2025-3-25 07:49 作者: Barrister 時間: 2025-3-25 14:45 作者: eardrum 時間: 2025-3-25 18:31 作者: 果仁 時間: 2025-3-25 22:17
Identifying OS Kernel Objects for Run-Time Security Analysisurate understanding of kernel dynamic data layout in memory becomes crucial. In this paper, we address the problem of systemically uncovering all OS dynamic kernel runtime objects, without any prior knowledge of the OS kernel data layout in memory. We present a new hybrid approach to uncover kernel 作者: 哭得清醒了 時間: 2025-3-26 02:55 作者: inspired 時間: 2025-3-26 07:33 作者: 著名 時間: 2025-3-26 11:56
Proxy Signature Scheme Based on Isomorphisms of Polynomialsed on the hardness of integer factoring, discrete logarithm, and/or elliptic curve. However, Shor proved that the emerging quantum computers can solve the problem of prime factorization and discrete logarithm in polynomial-time, which threatens the security of current RSA, ElGamal, ECC, and the prox作者: 吸氣 時間: 2025-3-26 13:28
Universal Designated Verifier Signcryption of a signer, to convince a designated verifier that he is in possession of a signer’s signature, while the verifier cannot transfer such conviction to anyone else. In existing designs of UDVS, a secure channel is required between the signer and the signature holder for signature transmission. In th作者: 熔巖 時間: 2025-3-26 18:32 作者: 裝勇敢地做 時間: 2025-3-26 21:54 作者: expansive 時間: 2025-3-27 04:30
Estimating the Number of Hosts Corresponding to an Address while Preserving Anonymityallocation of addresses and the prohibition of access to privacy sensitive data that can reveal user identities and remove anonymity. We propose a probabilistic method that strikes a desired balance between . and .. By utilising the phenomenon of preferential attachment, we show that the number of h作者: 擁護者 時間: 2025-3-27 05:52
Efficient and Robust Identity-Based Handoff Authentication in Wireless Networksr chameleon hash function serves as the primary ingredient. Compared with all the existing identity-based handoff-related schemes, the main advantage of the proposed scheme eliminates the assumption that PKG is fully trusted. Besides, we show that the proposed scheme not only provides robust securit作者: PRO 時間: 2025-3-27 12:42
An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wryptographic algorithms and erasure correction codes (ECCs) to SVC video streams such that the authenticated streams are format compliant with the SVC specifications and preserve the three dimensional scalability (i. e., spatial, quality and temporal) of the original streams. We implement our scheme作者: gratify 時間: 2025-3-27 14:19
The Performance of Public Key-Based Authentication Protocols them, there have been several techniques and protocols to integrate public key cryptography into Kerberos. Public-Key Cross Realm Authentication in Kerberos (PKCROSS) is one of these protocols. It has been proposed to simplify the administrative burden of maintaining cross-realm keys so that it imp作者: G-spot 時間: 2025-3-27 20:59
Boardroom Voting Scheme with Unconditionally Secret Ballots Based on DC-Net its guarantee of unconditionally perfect ballot secrecy. It satisfies self-tallying, fairness and verifiability. Disruption of the result of an election equals to breaking the Discrete Logarithm Problem. Our scheme is built on top of the DC-net(dining cryptographers network) anonymous broadcast pro作者: 滔滔不絕地說 時間: 2025-3-28 01:21
Resilience Strategies for Networked Malware Detection and Remediationscales in which human reaction is unlikely to be effective. Research on worm detection has produced many approaches to identifying them. A common approach is to identify a worm’s signature. However, as worms continue to evolve, this method is incapable of detecting and mitigating new worms in real t作者: 憤憤不平 時間: 2025-3-28 03:50 作者: Baffle 時間: 2025-3-28 07:51
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/n/image/662892.jpg作者: 2否定 時間: 2025-3-28 14:01 作者: GRATE 時間: 2025-3-28 16:08 作者: irritation 時間: 2025-3-28 19:19 作者: 使害羞 時間: 2025-3-29 01:43
On the Automated Analysis of Safety in Usage Control: A New Decidability Resultr the decidability of the safety problem for UCON systems whose attributes are allowed to range over infinite domains and updates in one process may affect the state of another. Our result is a significant generalization of those available in the literature.作者: 膽汁 時間: 2025-3-29 03:30
Conference proceedings 2012 China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.作者: 不能強迫我 時間: 2025-3-29 08:13 作者: Offensive 時間: 2025-3-29 13:12 作者: kindred 時間: 2025-3-29 19:05
Yuxin Meng,Lam-for Kwokla résolution des équations d‘ Euler stationnaires. Des résultats obtenus par une méthode de différences finies et une méthode d‘ éléments finis sont présentés. Des comparaisons détaillées ont été rendues possibles par le choix d‘ un même maillage pour les deux méthodes de discrétisation.作者: Abrade 時間: 2025-3-29 21:46 作者: 監(jiān)禁 時間: 2025-3-30 02:43
Steffen Wagner,Sascha Wessel,Frederic Stumpfla résolution des équations d‘ Euler stationnaires. Des résultats obtenus par une méthode de différences finies et une méthode d‘ éléments finis sont présentés. Des comparaisons détaillées ont été rendues possibles par le choix d‘ un même maillage pour les deux méthodes de discrétisation.作者: 吞吞吐吐 時間: 2025-3-30 05:23 作者: 爭吵加 時間: 2025-3-30 08:20 作者: Acquired 時間: 2025-3-30 15:03
Amani S. Ibrahim,James Hamlyn-Harris,John Grundy,Mohamed Almorsyla résolution des équations d‘ Euler stationnaires. Des résultats obtenus par une méthode de différences finies et une méthode d‘ éléments finis sont présentés. Des comparaisons détaillées ont été rendues possibles par le choix d‘ un même maillage pour les deux méthodes de discrétisation.作者: jaundiced 時間: 2025-3-30 17:19 作者: 繞著哥哥問 時間: 2025-3-31 00:35 作者: 蔑視 時間: 2025-3-31 01:09
Shaohua Tang,Lingling Xula résolution des équations d‘ Euler stationnaires. Des résultats obtenus par une méthode de différences finies et une méthode d‘ éléments finis sont présentés. Des comparaisons détaillées ont été rendues possibles par le choix d‘ un même maillage pour les deux méthodes de discrétisation.作者: Euthyroid 時間: 2025-3-31 05:03
Fei Tang,Changlu Lin,Pinhui Kela résolution des équations d‘ Euler stationnaires. Des résultats obtenus par une méthode de différences finies et une méthode d‘ éléments finis sont présentés. Des comparaisons détaillées ont été rendues possibles par le choix d‘ un même maillage pour les deux méthodes de discrétisation.作者: Onerous 時間: 2025-3-31 11:17
Juan Pablo Timpanaro,Isabelle Chrisment,Olivier Festorla résolution des équations d‘ Euler stationnaires. Des résultats obtenus par une méthode de différences finies et une méthode d‘ éléments finis sont présentés. Des comparaisons détaillées ont été rendues possibles par le choix d‘ un même maillage pour les deux méthodes de discrétisation.作者: 秘方藥 時間: 2025-3-31 15:04
Samaneh Mahdavifar,Mahdi Abadi,Mohsen Kahani,Hassan Mahdikhanit is time consuming and arduos for the patients. Routine static threshold perimetry of the central 30 degrees of the visual field using 76 points may take as long at 20 minutes in an eye with severe abnormality, and as much as 15 minutes in a normal eye. In order to expedite visual field testing, re作者: 帽子 時間: 2025-3-31 19:51
Alif Wahid,Christopher Leckie,Chenfeng Zhouhe zone of propagation of a surface wave are calculated. For an isotropic elastic half-space with damage of its material, a self-consistent problem is formulated that includes the dynamic equation of elasticity theory and the kinetic equation of damage accumulation in the material of the medium. Thi作者: 單挑 時間: 2025-3-31 23:25
Qi Han,Yinghui Zhang,Xiaofeng Chen,Hui Li,Jiaxiang Quanfor superb hospitality which made this conference a memorable intellectual and cultural experience. It is a pleasure to acknowledge financial support from the North Atlantic Treaty Organization (NATO) Scientific Affairs Division.978-1-4684-8773-2978-1-4684-8771-8Series ISSN 0258-1221 作者: Immunization 時間: 2025-4-1 03:49 作者: 暗諷 時間: 2025-4-1 06:13
Long-Hai Li,Cheng-Qiang Huang,Shao-Feng Furatively (i) interfaces formed by Fe or by Sm on Si(001), (ii) by Fe on GaAs(001) and on InAs(001), (iii) and by Co on bare GaAs(011) and on GaAs(011) passivated with Sb, in order to outline how small changes of the nature of the metal deposited, of the substrate (though identical from the chemical