派博傳思國際中心

標題: Titlebook: Security Technology; International Confer Tai-hoon Kim,Hojjat Adeli,Muhammad Khurram Khan Conference proceedings 2011 The Editor(s) (if app [打印本頁]

作者: damped    時間: 2025-3-21 18:29
書目名稱Security Technology影響因子(影響力)




書目名稱Security Technology影響因子(影響力)學科排名




書目名稱Security Technology網(wǎng)絡(luò)公開度




書目名稱Security Technology網(wǎng)絡(luò)公開度學科排名




書目名稱Security Technology被引頻次




書目名稱Security Technology被引頻次學科排名




書目名稱Security Technology年度引用




書目名稱Security Technology年度引用學科排名




書目名稱Security Technology讀者反饋




書目名稱Security Technology讀者反饋學科排名





作者: 忘川河    時間: 2025-3-21 20:37

作者: 走路左晃右晃    時間: 2025-3-22 02:58
Yindong Chendies; third, to present a simple model that can be used to assess the complex connections between cultural values, institutions, demographic and socioeconomic dimensions, and the arrangements, both private and public, that societies use to provide care to children and older persons; and finally, to
作者: biosphere    時間: 2025-3-22 05:18

作者: exorbitant    時間: 2025-3-22 11:59
Yi-Ming Chen,Cheng-En Chuang,Hsu-Che Liu,Cheng-Yi Ni,Chun-Tang Wangsed longevity. One would hope that remittances from abroad would help support relatives back at home. Evidence, however, seems to indicate that the percent of the population that accesses international transfer payments is still small. Another option for income security in old age would be access to
作者: 潛伏期    時間: 2025-3-22 13:02
Theodosios Tsiakis,Aristeidis Chatzipoulidis,Theodoros Kargidis,Athanasios Belidisdies; third, to present a simple model that can be used to assess the complex connections between cultural values, institutions, demographic and socioeconomic dimensions, and the arrangements, both private and public, that societies use to provide care to children and older persons; and finally, to
作者: prostate-gland    時間: 2025-3-22 18:23

作者: 偏見    時間: 2025-3-22 21:33

作者: 鎮(zhèn)壓    時間: 2025-3-23 01:23

作者: 后來    時間: 2025-3-23 07:19

作者: 缺乏    時間: 2025-3-23 12:34

作者: 過于光澤    時間: 2025-3-23 14:12

作者: cocoon    時間: 2025-3-23 20:24

作者: Insensate    時間: 2025-3-24 00:18
David Rebollo-Monedero,Javier Parra-Arnau,Jordi Fornéx systems, sustainable development, endogenous economic growth, directed technical change, and credit-based-money literatures. Throughout, the perspective is that of a policy adviser to a "wellbeing state", as distinct from a "welfare state". The key linkages or relationships in the model are suppor
作者: 左右連貫    時間: 2025-3-24 05:34
Panayotis E. Nastou,Yannis C. StamatiouSinne scheint die Funktion zu erfüllen, Menschen in derart unterschiedlichen Situationen zu einer Nation zusammenzufassen, indem gegenüber der sozialen und r?umlichen Fragmentierung eine zeitliche Kontinuit?t behauptet wird, genauer: die ungebrochene Tradierung einer Nationalidentit?t, einer kollekt
作者: 擔心    時間: 2025-3-24 10:17
Hae-Jung Kim,Eun-Jun YoonSinne scheint die Funktion zu erfüllen, Menschen in derart unterschiedlichen Situationen zu einer Nation zusammenzufassen, indem gegenüber der sozialen und r?umlichen Fragmentierung eine zeitliche Kontinuit?t behauptet wird, genauer: die ungebrochene Tradierung einer Nationalidentit?t, einer kollekt
作者: Decimate    時間: 2025-3-24 14:19

作者: LAP    時間: 2025-3-24 17:33
Robust Audio Watermarking Scheme Based on Short Time Fourier Transformation and Singular Value Deconds of attacks such as noise addition, cropping, re-sampling, re-quantization, MP3 compression, and achieves similarity values ranging from 28 to 32. In addition, our proposed scheme achieves signal-to-noise ratio (SNR) values ranging from 20 to 31 dB.
作者: 凈禮    時間: 2025-3-24 20:58
A Distributed, Parametric Platform for Constructing Secure SBoxes in Block Cipher Designs,itution boxes with good security properties. It is fully parametric since it can employ any class of Boolean functions with algorithmically definable properties and can construct SBoxes of arbitrary sizes. We demonstrate the efficiency of the distributed algorithm implementation compared to its sequ
作者: 羞辱    時間: 2025-3-25 01:32

作者: HERTZ    時間: 2025-3-25 06:47
A Survey on Access Control Deployment, of access control models grow out of their respective application domains such as healthcare and collaborative enterprises; and even then, further administering means, human factor considerations, and infringement management are required to effectively deploy the model in the particular usage envir
作者: 別名    時間: 2025-3-25 10:07

作者: 受辱    時間: 2025-3-25 14:22

作者: 補角    時間: 2025-3-25 16:58
A Family Constructions of Odd-Variable Boolean Function with Optimum Algebraic Immunity,sed in cryptosystem should have high algebraic immunity. This paper generalizes Dalai’s and Chen’s constructions, and gets a new family constructions for odd-variable Boolean function with optimum algebraic immunity. By employing different transformations of Boolean functions, there would generate d
作者: 老巫婆    時間: 2025-3-25 23:12

作者: 象形文字    時間: 2025-3-26 01:17
Using Agent in Virtual Machine for Interactive Security Training,ckers intrude the systems. In this paper, we propose a platform that combining agent and virtualization technologies to build an interactive security training platform with which people can easily get security training. In our system, all malicious programs are contained in virtual machines, and by
作者: 準則    時間: 2025-3-26 06:23

作者: 商品    時間: 2025-3-26 10:45
A Fast and Secure One-Way Hash Function,is paper we proposed a fast one-way hash function to optimize the time delay with strong collision resistance, assures a good compression and one-way resistance. It is based on the standard secure hash function (SHA-1) algorithm. The analysis indicates that the proposed algorithm which we called (fS
作者: phase-2-enzyme    時間: 2025-3-26 12:54
CLAPTCHA- A Novel Captcha,captcha. In this Claptcha, we have to find the English alphabets (alpha). Its efficiency is also proven here to be better than normal image based captchas or imagination captchas. Claptchas will be also more user friendly and enjoying.
作者: 閑逛    時間: 2025-3-26 20:09
An Approach to Provide Security in Wireless Sensor Network Using Block Mode of Cipher,ded to provide data confidentiality and authentication. Existing security approaches in Wireless Sensor networks is basically based on some particular assumptions about the participating nodes and the network environment combined for a specific application. In Sensor networks there is resource const
作者: 盡忠    時間: 2025-3-26 22:04
Microscopic Analysis of Chips, specific requirements. For this reason, it is essential to examine various properties of chips; one of those can be, e.g., the chip security with respect to its physical structure. This paper provides description of a proven chip decapsulation process (the presented process can be used to obtain ba
作者: dainty    時間: 2025-3-27 04:00

作者: 友好關(guān)系    時間: 2025-3-27 05:28

作者: blithe    時間: 2025-3-27 09:27
A Study on Domain Name System as Lookup Manager for Wireless/Mobile Systems in IPv6 Networks,e to transparently maintain connections while moving from one subnet to another. Each device is identified by its home address although it may be connecting to through another network. When connecting through a foreign network, a mobile device sends its location information to a home agent, which in
作者: Cloudburst    時間: 2025-3-27 16:26
An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval, measured privacy risk as a divergence between the user’s and the population’s query distribution, and contemplated the entropy of the user’s distribution as a particular case. In this work, we make a twofold contribution. First, we thoroughly interpret and justify the privacy metric proposed in our
作者: BOOM    時間: 2025-3-27 21:31

作者: 性學院    時間: 2025-3-27 23:38
Cryptanalysis of an Enhanced Simple Three-Party Key Exchange Protocol,ively adopted in network communications. In 2009, Nam et al. pointed out that S-3PAKE protocol, by Lu and Cao for password-authenticated key exchange in the three-party setting, is vulnerable to an off-line dictionary attack. Then, they proposed some countermeasures how to eliminate the security vul
作者: 送秋波    時間: 2025-3-28 05:46
An Effective Distance-Computing Method for Network Anomaly Detection, of them are based on data mining or machine learning methods, which brings unexpected heavy computational cost and high false alarm rates. In this paper, we propose a simple distance-computing algorithm for network anomaly detection, which is able to distinguish network anomalies from normal traffi
作者: pineal-gland    時間: 2025-3-28 07:16

作者: LIKEN    時間: 2025-3-28 10:59
Information Technology Security Governance Approach Comparison in E-banking,omponents of an e-banking environment, clarify congruent terminology used in achieving Information Security Governance (ISG) objectives and evaluate most reputed ITSG approaches to help banks choose which approach best fits the e-banking environment.
作者: 毛細血管    時間: 2025-3-28 17:26
A Study on Domain Name System as Lookup Manager for Wireless/Mobile Systems in IPv6 Networks, it is very easy if it knows the IP address of the web server. As practiced, we use the domain name when searching for websites other than the IP address. This paper suggests an IP lookup in Mobile IPv6 environment. This method utilizes the DNS lookup.
作者: 頭盔    時間: 2025-3-28 20:09
An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval,as measures of privacy. Secondly, we attempt to bridge the gap between the privacy and the information-theoretic communities by substantially adapting some technicalities of our original work to reach a wider audience, not intimately familiar with information theory and the method of types.
作者: STENT    時間: 2025-3-29 00:46
Conference proceedings 2011rence, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, in December 2011.The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of security technology.
作者: 珊瑚    時間: 2025-3-29 03:54
1865-0929 rences, SecTech 2011, held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, in December 2011.The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of securi
作者: crockery    時間: 2025-3-29 10:01

作者: 費解    時間: 2025-3-29 12:38
A Survey on Access Control Deployment,onment. This paper presents a survey of access control mechanisms along with their deployment issues and solutions available today. We aim to give a comprehensive big picture as well as pragmatic deployment details to guide in understanding, setting up and enforcing access control in its real world application.
作者: 蔑視    時間: 2025-3-29 19:23
Data Anonymity in Multi-Party Service Model,d anonymized datasets. We considered a new service model that involves more than two data holders and a data user, and proposed a new privacy requirement. Furthermore, we discussed feasible approaches searching a table that satisfies the privacy requirement and showed a concrete algorithm to find the table.
作者: agnostic    時間: 2025-3-29 19:42
A Noise-Tolerant Enhanced Classification Method for Logo Detection and Brand Classification,e in training, (ii) design of a Stage Selection Optimization (SSO) method which is compatible with the training approach to improve the classification speed and the detection accuracy, (iii) development of an automatic classification system which achieves promising logo detection and brand classification results.
作者: 殘酷的地方    時間: 2025-3-30 00:35

作者: 奇怪    時間: 2025-3-30 05:15

作者: intricacy    時間: 2025-3-30 11:33

作者: PLIC    時間: 2025-3-30 14:17
An Effective Distance-Computing Method for Network Anomaly Detection,c using simple but effective distance-computing mechanism. Experimental results on the well-known KDD Cup 1999 dataset demonstrate it can effectively detect anomalies with high true positives, low false positives with acceptable computational cost.
作者: 蕁麻    時間: 2025-3-30 19:07
Using Agent in Virtual Machine for Interactive Security Training, This kind of interactivity as well as the individualized learning experience will decrease the disadvantage of “single size fit all” which is generally associated with traditional security training courses.
作者: Subjugate    時間: 2025-3-30 21:47
A Fast and Secure One-Way Hash Function,resistance. It is based on the standard secure hash function (SHA-1) algorithm. The analysis indicates that the proposed algorithm which we called (fSHA-1) is collision resistant and assures a good compression and pre-image resistance. In addition, the executing time compared with the standard secure hash function is much shorter.
作者: gangrene    時間: 2025-3-31 01:35
1865-0929 orea, in December 2011.The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of security technology.978-3-642-27188-5978-3-642-27189-2Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: BALK    時間: 2025-3-31 05:17
A Family Constructions of Odd-Variable Boolean Function with Optimum Algebraic Immunity,sed in cryptosystem should have high algebraic immunity. This paper generalizes Dalai’s and Chen’s constructions, and gets a new family constructions for odd-variable Boolean function with optimum algebraic immunity. By employing different transformations of Boolean functions, there would generate different constructions.
作者: Nefarious    時間: 2025-3-31 11:47
CLAPTCHA- A Novel Captcha,captcha. In this Claptcha, we have to find the English alphabets (alpha). Its efficiency is also proven here to be better than normal image based captchas or imagination captchas. Claptchas will be also more user friendly and enjoying.
作者: GRIEF    時間: 2025-3-31 16:22
An ID-Based Broadcast Signcryption Scheme Secure in the Standard Model,nd authenticated communications to several different receivers in the open channel. In this paper, we propose a concrete identity-based broadcast signcryption scheme in the standard model. The proposed scheme satisfies the message confidentiality and unforgeability.
作者: hypnogram    時間: 2025-3-31 21:30
Conference proceedings 2011rence, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, in December 2011.The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of security technology.
作者: Abrupt    時間: 2025-3-31 22:50
Communications in Computer and Information Sciencehttp://image.papertrans.cn/s/image/863441.jpg
作者: Lipoprotein    時間: 2025-4-1 02:42

作者: pancreas    時間: 2025-4-1 07:08

作者: 用手捏    時間: 2025-4-1 13:50
Security Technology978-3-642-27189-2Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: Accrue    時間: 2025-4-1 16:30
Tai-hoon Kim,Hojjat Adeli,Muhammad Khurram KhanFast-track conference proceedings.State-of-the-art research.Up-to-date results
作者: 違法事實    時間: 2025-4-1 20:02

作者: abolish    時間: 2025-4-1 22:56

作者: cravat    時間: 2025-4-2 05:26
Yu Chen,Vrizlynn L. L. Thingajor intergenerational theories and research studies from a .This volume explores intergenerational practices and their impact on social sustainability, with an emphasis on developing programmatic efforts to address profound social challenges such as underperforming educational and work-related syst
作者: 聲明    時間: 2025-4-2 07:19
Yindong Chened in this volume, their bonding reflects personal wishes and material goals, emotional bonds and rational justifications, altruism and self-interest, caregiving and care receiving. The study of IG solidarity requires a genuine interdisciplinary approach that can facilitate the intersection of profe
作者: 環(huán)形    時間: 2025-4-2 12:27
Vrizlynn L. L. Thing,Wee-Yong Lim,Junming Zeng,Darell J. J. Tan,Yu Chensfer payments from remittances, public payments, and pensions are presently not enough to support the growing income needs of the people, and particularly of older persons. Peruvian society possesses a strong tradition of solidarity within the extended family, and this basic social unit is resilient
作者: 我邪惡    時間: 2025-4-2 16:20





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
宁晋县| 安图县| 昌宁县| 巢湖市| 津南区| 淳化县| 巢湖市| 社旗县| 徐州市| 衢州市| 陆良县| 台湾省| 嘉峪关市| 敦化市| 浏阳市| 井研县| 祥云县| 静海县| 松滋市| 江门市| 龙州县| 湘乡市| 武邑县| 山阳县| 巫山县| 三门峡市| 海宁市| 黔西| 尉氏县| 滦平县| 西安市| 防城港市| SHOW| 林周县| 迭部县| 香港 | 霍城县| 富锦市| 云龙县| 萨迦县| 新沂市|