標(biāo)題: Titlebook: Recent Trends in Computer Networks and Distributed Systems Security; International Confer Sabu M. Thampi,Albert Y. Zomaya,Tony Thomas Confe [打印本頁] 作者: intrinsic 時(shí)間: 2025-3-21 19:29
書目名稱Recent Trends in Computer Networks and Distributed Systems Security影響因子(影響力)
書目名稱Recent Trends in Computer Networks and Distributed Systems Security影響因子(影響力)學(xué)科排名
書目名稱Recent Trends in Computer Networks and Distributed Systems Security網(wǎng)絡(luò)公開度
書目名稱Recent Trends in Computer Networks and Distributed Systems Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Recent Trends in Computer Networks and Distributed Systems Security被引頻次
書目名稱Recent Trends in Computer Networks and Distributed Systems Security被引頻次學(xué)科排名
書目名稱Recent Trends in Computer Networks and Distributed Systems Security年度引用
書目名稱Recent Trends in Computer Networks and Distributed Systems Security年度引用學(xué)科排名
書目名稱Recent Trends in Computer Networks and Distributed Systems Security讀者反饋
書目名稱Recent Trends in Computer Networks and Distributed Systems Security讀者反饋學(xué)科排名
作者: labile 時(shí)間: 2025-3-21 23:29 作者: 打算 時(shí)間: 2025-3-22 03:03
Conference proceedings 2012 held in Trivandrum, India, in October 2012. The 34 revised full papers and 8 poster presentations were carefully reviewed and selected from 112 submissions. The papers cover various topics in Computer Networks and Distributed Systems.作者: 楓樹 時(shí)間: 2025-3-22 05:50
978-3-642-34134-2Springer-Verlag Berlin Heidelberg 2012作者: CHART 時(shí)間: 2025-3-22 09:40
Recent Trends in Computer Networks and Distributed Systems Security978-3-642-34135-9Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: Affable 時(shí)間: 2025-3-22 16:24
Sabu M. Thampi,Albert Y. Zomaya,Tony ThomasUp-to-date results.Fast track conference proceedings.State-of-the-art report作者: Emmenagogue 時(shí)間: 2025-3-22 17:41
Communications in Computer and Information Sciencehttp://image.papertrans.cn/r/image/823417.jpg作者: 招惹 時(shí)間: 2025-3-23 00:29
https://doi.org/10.1007/978-3-642-34135-9cloud computing; encryption; intrusion detection; malicios behavior; mobile ad-hoc networks; algorithm an作者: regale 時(shí)間: 2025-3-23 03:10
Nelcileno Araújo,Ruy de Oliveira,Ed’ Wilson Tavares Ferreira,Valtemir Nascimento,Ailton Shinoda Akir作者: Synovial-Fluid 時(shí)間: 2025-3-23 08:46
Prashant Kumar Mishra,Kunwar Singh,Sudhanshu Baruntar作者: admission 時(shí)間: 2025-3-23 13:44 作者: 符合你規(guī)定 時(shí)間: 2025-3-23 16:07
Aravind Ashok,Prabaharan Poornachandran,Krishnasree Achuthan作者: 鋸齒狀 時(shí)間: 2025-3-23 19:42 作者: MOTIF 時(shí)間: 2025-3-24 00:36
Tiana Razafindralambo,Guillaume Bouffard,Bhagyalekshmy N. Thampi,Jean-Louis Lanet作者: Dealing 時(shí)間: 2025-3-24 03:02
Recent Trends in Computer Networks and Distributed Systems SecurityInternational Confer作者: alabaster 時(shí)間: 2025-3-24 07:38 作者: 天真 時(shí)間: 2025-3-24 14:37 作者: 直言不諱 時(shí)間: 2025-3-24 15:46 作者: Endemic 時(shí)間: 2025-3-24 19:51 作者: 傲慢物 時(shí)間: 2025-3-25 00:16
he world around us. Several excellent textbooks are available covering most aspects of environmental physics and of appli- tions of physics to the natural environment from various points of view. However, while teaching environmental physics to university students, I sorelymissedabookspeci?callydevo作者: 復(fù)習(xí) 時(shí)間: 2025-3-25 03:54
Secure Leader Election Algorithm Optimized for Power Saving Using Mobile Agents for Intrusion Detect electing the most cost- efficient node. We will call it leader-IDS. Our contribution to the election scheme is to design an algorithm which uses mobile agents to gather resource information from all the cluster nodes and use it to elect leader in optimum and secure manner.作者: Hiatal-Hernia 時(shí)間: 2025-3-25 07:34
Towards Constructing a Trustworthy Internet: Privacy-Aware Transfer of Digital Identity Document in bound to XML-based digital identity document. We explain that the forwarding engine verifies the validity of digital identity document transmission on the basis of identity contract terms. Three use cases are presented to detail the proposed approach with the corresponding UML sequence diagrams.作者: 大炮 時(shí)間: 2025-3-25 14:56
Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Usiny management protocol design for simultaneous multiple groups. The proposed scheme achieves significant reduction in rekeying cost, storage compared to these schemes. Interestingly, we achieve this efficiency in the rekeying cost without much increase in storage at user.作者: 注意 時(shí)間: 2025-3-25 16:00
Effective Implementation of DES Algorithm for Voice Scramblingurage eavesdropping from co-channel users or RF scanners. The DES design is implemented on Virtex 5 XC5VLX110T Field Programming Gate Arrays (FPGA) technology. Final 16-stage pipelined design is achieved with encryption rate of 35.5 Gbit/s and 2140 number of Configurable logic blocks (CLBs).作者: 預(yù)測 時(shí)間: 2025-3-25 23:31
Multilingual Speaker Identification with the Constraint of Limited Data Using Multitaper MFCCtracted and modeled using Gaussian Mixture Model (GMM)-Universal Background Model (UBM). The results show that the multitaper MFCC approach performs better than the conventional Hamming window MFCC technique in all the speaker identification experiments.作者: Pastry 時(shí)間: 2025-3-26 02:11 作者: 裝入膠囊 時(shí)間: 2025-3-26 06:12
1865-0929 nal Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012. The 34 revised full papers and 8 poster presentations were carefully reviewed and selected from 112 submissions. The papers cover various topics in Computer Networks and作者: 奇思怪想 時(shí)間: 2025-3-26 10:34 作者: 放逐 時(shí)間: 2025-3-26 14:04 作者: Hyperalgesia 時(shí)間: 2025-3-26 17:05
Imperceptible Image Indexing Using Digital Watermarkingodifications to such pixel will not attract the attention of human eyes. Watermark is thus integrated imperceptibly into the digital images. The proposed is a scheme for embedding a unique index number as watermark for content tracking and identification.作者: Generosity 時(shí)間: 2025-3-26 21:59
1865-0929 papers and 8 poster presentations were carefully reviewed and selected from 112 submissions. The papers cover various topics in Computer Networks and Distributed Systems.978-3-642-34134-2978-3-642-34135-9Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 微生物 時(shí)間: 2025-3-27 02:48
A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials) and polynomial interpolation. Since the elliptic curve scalar multiplication and construction of interpolating polynomials are time-consuming operations, most of the proposed schemes require high storage and computational complexity. Further, most of the proposed schemes are vulnerable to differen作者: Optometrist 時(shí)間: 2025-3-27 09:15
Publicly Auditable Provable Data Possession Scheme for Outsourced Data in the Public Cloud Using Poladigm poses several security challenges. We focus on the problem of checking the possession of data by the untrusted cloud storage server. We design publicly auditable provable data possession scheme using polynomial interpolation technique. In our scheme, the client can delegate the task of verific作者: 牛的細(xì)微差別 時(shí)間: 2025-3-27 09:46 作者: 遵循的規(guī)范 時(shí)間: 2025-3-27 17:29
ID-Based Threshold Signcryption and Group Unsigncryption unsigncryption, which is based on discrete logarithm problem in finite field. For unsigncryption to recover the message the cooperation of group members of the receivers group is required. The proposed scheme has additional advantage against malicious verifiers.作者: BURSA 時(shí)間: 2025-3-27 20:51
Protocol for Secure Submissions into Learning Management Systemserver architecture that uses cryptography is proposed to transform a regular assignment deliverable into a secure deliverable. A protocol is devised between client and server such that faculty and students can securely obtain symmetric keys to either encrypt or decrypt an assignment deliverable.作者: Repatriate 時(shí)間: 2025-3-27 23:15
Secure Leader Election Algorithm Optimized for Power Saving Using Mobile Agents for Intrusion Detectter of nodes in mobile ad hoc networks using Mobile Agents. To reduce the performance overhead of IDS, a leader node is elected to handle intrusion detection service for the whole cluster. If the cluster head selection is random, it might be possible that resource consumption of the leader is higher作者: 否認(rèn) 時(shí)間: 2025-3-28 02:23 作者: 注意力集中 時(shí)間: 2025-3-28 07:54
Effective Implementation of DES Algorithm for Voice Scramblingand high security environments. The scrambling algorithm is based on DES algorithm with a novel skew core key scheduling. The scrambled speech signal is not intelligible to the listener, but the recovered audio is very clear. This type of encryption can be used in applications where we need to disco作者: 哀悼 時(shí)間: 2025-3-28 11:19 作者: Fortuitous 時(shí)間: 2025-3-28 17:53 作者: 食料 時(shí)間: 2025-3-28 19:20
Imperceptible Image Indexing Using Digital Watermarkingtermarking is less sensitive to HVS (Human Visual System). Edge detectors are used to estimate regions in the image where intensity changes rapidly. Modifications to such pixel will not attract the attention of human eyes. Watermark is thus integrated imperceptibly into the digital images. The propo作者: Soliloquy 時(shí)間: 2025-3-29 01:12
A New Deterministic Algorithm for Testing Primality Based on a New Property of Prime Numbersyields all of the prime numbers and no composites. Due to this uncertainty surrounding the theory of prime numbers, popular algorithms proposed in literature till date, rely heavily on probabilistic methods to determine primality. The paper proposes a new theory on the nature of prime numbers. In pa作者: 緊張過度 時(shí)間: 2025-3-29 06:46
Multilingual Speaker Identification with the Constraint of Limited Data Using Multitaper MFCCultitaper Mel-frequency cepstral coefficient (multitaper MFCC) features for Multilingual speaker identification with the constraint of limited data. The speaker identification study is conducted using 30 speakers of our own database. Sine-weighted cepstrum estimator (SWCE) taper MFCC features are ex作者: 注射器 時(shí)間: 2025-3-29 10:15
Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Usination of simultaneous/concurrent multiple groups in the Secure Group Communication model with overlapping memberships. Designing a secure key management scheme with efficient rekeying process in this scenario is a challenging task. We design an efficient secure group key management scheme for simult作者: cartilage 時(shí)間: 2025-3-29 15:26 作者: GILD 時(shí)間: 2025-3-29 18:07
Simulation and Evaluation of Different Mobility Models in Ad-Hoc Sensor Network over DSR Protocol Usis used for evaluation of wireless networks. WSN is Multi-hop Self-configuring and consists of sensor nodes. The movements of nodes are like the patterns which can be classified into different mobility models and each of them have been characterized by its own distinctive features and also plays an 作者: 蛙鳴聲 時(shí)間: 2025-3-29 21:11
Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functionsguarding against attempts to establish fraudulent multiple identities or prevent identity fraud. The greatest advantage that the biometric data of an individual remains constant acts as its biggest liability. Once the attacker gets biometric password of an individual then security of his data become作者: GOUGE 時(shí)間: 2025-3-30 03:08 作者: prosperity 時(shí)間: 2025-3-30 05:09
A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacksthis context, smart card industries try to overcome the anomaly by implementing various countermeasures. In this paper we discuss and present a powerful attack based on the vulnerability of the linker which could change the correct byte code into malicious one. During the attack, the linker interpre作者: Externalize 時(shí)間: 2025-3-30 09:23 作者: 污點(diǎn) 時(shí)間: 2025-3-30 16:05
A New Deterministic Algorithm for Testing Primality Based on a New Property of Prime Numberssimple way. It is shown in the paper that, in so doing, the theorems prove to be a common thread through which all the prime numbers of a number system can be related. Based on the theorems, a new prime number generating algorithm and a new purely deterministic method to test primality is explained and illustrated with the help of examples.作者: dendrites 時(shí)間: 2025-3-30 20:07 作者: harangue 時(shí)間: 2025-3-31 00:04 作者: Gleason-score 時(shí)間: 2025-3-31 04:37 作者: 車床 時(shí)間: 2025-3-31 08:33 作者: 安撫 時(shí)間: 2025-3-31 09:27 作者: 烤架 時(shí)間: 2025-3-31 16:48
1615-1844 tion of each molecule with the bondlengthsand bond angles is presented in parallel to the coordinates,thelatter are also on a floppy disk included in thehandbook for ease of the user.978-3-540-47525-5Series ISSN 1615-1844 Series E-ISSN 1616-9522