標(biāo)題: Titlebook: Security in Computing and Communications; Third International Jemal H. Abawajy,Sougata Mukherjea,Antonio Ruiz-Ma Conference proceedings 20 [打印本頁] 作者: 生手 時(shí)間: 2025-3-21 19:01
書目名稱Security in Computing and Communications影響因子(影響力)
書目名稱Security in Computing and Communications影響因子(影響力)學(xué)科排名
書目名稱Security in Computing and Communications網(wǎng)絡(luò)公開度
書目名稱Security in Computing and Communications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Security in Computing and Communications被引頻次
書目名稱Security in Computing and Communications被引頻次學(xué)科排名
書目名稱Security in Computing and Communications年度引用
書目名稱Security in Computing and Communications年度引用學(xué)科排名
書目名稱Security in Computing and Communications讀者反饋
書目名稱Security in Computing and Communications讀者反饋學(xué)科排名
作者: calorie 時(shí)間: 2025-3-21 21:21
1865-0929 iewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; system and network security; application security.978-3-319-22914-0978-3-319-22915-7Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 斷言 時(shí)間: 2025-3-22 03:36 作者: Culpable 時(shí)間: 2025-3-22 07:26 作者: 過度 時(shí)間: 2025-3-22 09:59
Reducing Vulnerability of a Fingerprint Authentication Systemher. The encrypted template serves as a virtual biometric. This prevents the revealing of original fingerprints to third party intruders. Moreover the attacker may not be aware that it is a mixed template that is used rather than the original fingerprint.作者: conifer 時(shí)間: 2025-3-22 13:10
Heart Rate Variability for Biometric Authentication Using Time-Domain Features0 samples of each subject, five are used for template creations and other five are used for testing. The system resulted in 17?% EER. The FAR & FRR graph against threshold and the ROC curve are presented.作者: 現(xiàn)代 時(shí)間: 2025-3-22 20:42 作者: Spinal-Fusion 時(shí)間: 2025-3-23 01:06
Conference proceedings 2015ndia, in August 2015. The 36 revised full papers presented together with 13 short papers were carefully reviewed and selected from 157 submissions. The papers are organized in topical sections on security in cloud computing; authentication and access control systems; cryptography and steganography; 作者: indoctrinate 時(shí)間: 2025-3-23 03:56
A Dynamic Multi-domain Access Control Model in Cloud Computingantage of RBAC and task driving model, to implement a more flexible and efficient access control model. Through comparative experiment we draw that new policy was improved to be contributory in improving the flexibility and availability of role-based multi-domain access control model.作者: AGOG 時(shí)間: 2025-3-23 09:10 作者: 審問 時(shí)間: 2025-3-23 12:37
Adaptive and Secure Application Partitioning for Offloading in Mobile Cloud Computingation is necessary. In this paper we are proposing a secure partitioning of application so that the most sensitive or vulnerable part of the application can be kept in the mobile and rest of the application can be offloaded to the cloud.作者: TRACE 時(shí)間: 2025-3-23 16:02
Secure and Privacy Preserving Biometric Authentication Using Watermarking Techniqueypt the watermarked biometric to protect its privacy from adversary. The watermarked biometric technique has been used for privacy preserving authentication purpose. The analysis proves the correctness, privacy and efficiency of our scheme.作者: 溫順 時(shí)間: 2025-3-23 19:09
A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Dis of visual data. There was a loss in pixel values due to the compression process. The implementation of the proposed approach was done successfully and analysis of the output results was done using MATLAB.作者: 范圍廣 時(shí)間: 2025-3-24 01:31 作者: Autobiography 時(shí)間: 2025-3-24 04:43 作者: Banister 時(shí)間: 2025-3-24 10:09
A Dynamic Multi-domain Access Control Model in Cloud Computingrought new challenges to access control technology. Direct at the existing problems of flexibility, timeliness and other aspects in multi-domain access control in the current cloud, on the basis of task driving idea, this paper put forward a dynamic access control policy. New method combined the adv作者: Forehead-Lift 時(shí)間: 2025-3-24 11:39 作者: 不合 時(shí)間: 2025-3-24 17:03 作者: 神圣不可 時(shí)間: 2025-3-24 20:29 作者: Orgasm 時(shí)間: 2025-3-25 00:54 作者: DOSE 時(shí)間: 2025-3-25 03:40
Design of an Efficient Verification Scheme for Correctness of Outsourced Computations in Cloud Compu Hence, the service providers in cloud computing cannot be trusted. To protect itself from being cheated on, by the untrusted service provider, the client needs a way to verify the correctness of computations returned by the cloud server, on its own machine. This should have very low computational c作者: 倒轉(zhuǎn) 時(shí)間: 2025-3-25 10:34 作者: 指派 時(shí)間: 2025-3-25 15:27 作者: 群居男女 時(shí)間: 2025-3-25 18:39
Anonymizing Classification Data for Preserving Privacysensitive information that may identify certain individuals breaching their privacy, whereas the classification goal requires to accurately classifying the data. One way to achieve both is to anonymize the dataset that contains the sensitive information of individuals before getting it released for 作者: arabesque 時(shí)間: 2025-3-25 20:17 作者: 暗諷 時(shí)間: 2025-3-26 02:43
Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Schemethey provide flexible and practical mechanism for collaborative computing. In this paper, we propose a non-tree based secure group key management scheme based on polynomial construction method. In the proposed scheme, an user is supposed to store only two keys (private shared key and group key). Whe作者: BRACE 時(shí)間: 2025-3-26 04:51 作者: discord 時(shí)間: 2025-3-26 11:15 作者: 充滿裝飾 時(shí)間: 2025-3-26 15:56
Reducing Vulnerability of a Fingerprint Authentication Systemtry to recreate the original fingerprint. Here a system is proposed which prevents the possibility of generating fingerprints from the information in the database. Two different fingerprints are acquired from a person. Then the orientation of ridges is calculated from the first fingerprint and minut作者: 不可侵犯 時(shí)間: 2025-3-26 19:16
Heart Rate Variability for Biometric Authentication Using Time-Domain Featuresc and prognostic tool. This study is intended towards harnessing the HRV property of heart for authentication purpose. For measuring the RR-Interval for HRV analysis, we used photoplethysmography (PPG) based pulse sensor and in-house designed microcontroller based RR-Interval measurement system. Dat作者: LAP 時(shí)間: 2025-3-26 21:59 作者: 過份好問 時(shí)間: 2025-3-27 02:24
chool community, in which psychology is committed to promoting well-being, learning, and development of all children. The handbook begins with an overview of the 1989 United Nations Committee on the Rights of the Child (CRC) and explores main themes such as, survival, protection, development, partic作者: FISC 時(shí)間: 2025-3-27 08:08 作者: 整體 時(shí)間: 2025-3-27 12:17
Dapeng Xiong,Peng Zou,Jun Cai,Jun Hemework (Bronfenbrenner, .. American Psychological Association, Washington, DC, 1999), we depict the child’s ecology as a nested set of systems that influence the child’s development and well-being. The school psychologist is pictured as a central “mesosystem” that facilitates the integration of chil作者: 增強(qiáng) 時(shí)間: 2025-3-27 16:17
Doyel Pal,Praveenkumar Khethavath,Johnson P. Thomas,Tingting Chendevelopment of social and emotional competence, personal ambition, and academic skills (Doll & Cummings, Transforming school mental health services: Population-based approaches to promoting the competency and wellness of children. Corwin Press, Thousand Oaks, CA, 2008). The promotion of psychologica作者: 激勵(lì) 時(shí)間: 2025-3-27 20:27
Deepnarayan Tiwari,G. R. Gangadharanighlight the interplay of legal systems when confronted by such international transactions, and to compare the various outcomes. The contributing authors have emphasized legal considerations but also have noted relevant commercial (or political) considerations where appropriate. It is assumed that t作者: Vertical 時(shí)間: 2025-3-27 23:08
Naveen Kumar,Anish Mathuria,Manik Lal Dasighlight the interplay of legal systems when confronted by such international transactions, and to compare the various outcomes. The contributing authors have emphasized legal considerations but also have noted relevant commercial (or political) considerations where appropriate. It is assumed that t作者: GRIEF 時(shí)間: 2025-3-28 02:48
N. M. Dhanya,G. Kousalyaast, to know how heritage has developed and inherited alongside history, and through which the past is brought to the present. By reviewing the linkage between heritage education and cultural identity, this chapter provides a case study of Central China, the region being regarded as the origin of Ch作者: Musculoskeletal 時(shí)間: 2025-3-28 07:46
Muthukumar B.,Praveen Kumar Rajendrannonformal and informal education within and beyond schools are also increasingly recognized as significant learning contexts. Now traditional “brick-and-mortar” schools represent one educational arena among others, with more people questioning their value for learning in the future. This chapter thu作者: cyanosis 時(shí)間: 2025-3-28 12:27
Ronak Vyas,Alok Singh,Jolly Singh,Gunjan Soni,B. R. Purushothamar and cultural perspectives of dominant national identities and competitiveness in the global market. In various Asian societies, legacies of colonial rule, depoliticized approaches to civic education, and persistent social inequalities further complicate the nature of schooling, teaching, and how s作者: PAN 時(shí)間: 2025-3-28 15:46 作者: 滲透 時(shí)間: 2025-3-28 22:35
ntrol fertility, to overcome infertility, and to create families. Among the practices that have resulted from the use of ARTs, surrogate pregnancy has persisted as a topic of interest among feminist scholars for more than 30 years. This chapter links social science literature about infertility treat作者: 和平 時(shí)間: 2025-3-29 01:41 作者: 冥界三河 時(shí)間: 2025-3-29 06:05 作者: neolith 時(shí)間: 2025-3-29 11:17 作者: Rct393 時(shí)間: 2025-3-29 12:33
Byrapura Rangappa Purushothama,B. B. Amberkerf the twenty-four chapters, eight are written by former students or colleagues with whom I have worked in the past and whom I still meet at conferences on geographical education. It is with a certain pride and joy that I note the progress which has been made in geographical education both in its day作者: 消耗 時(shí)間: 2025-3-29 18:20
Anup Kumar Maurya,V. N. Sastry,Siba Kumar Udgatae imposition of curricula at the national level to detailed lesson planning. It has ranged from a type of planning that was at best . and rigid; to one that remained rigid and . in intent, though became much broader in scale; to the more sophisticated and ‘scientific’ or . curriculum planning. It mu作者: 彎彎曲曲 時(shí)間: 2025-3-29 20:52 作者: 修剪過的樹籬 時(shí)間: 2025-3-30 01:36 作者: 虛情假意 時(shí)間: 2025-3-30 05:31 作者: 挑剔為人 時(shí)間: 2025-3-30 09:58 作者: Intruder 時(shí)間: 2025-3-30 14:16 作者: STEER 時(shí)間: 2025-3-30 18:41
FPGA Implementation of 128-Bit Fused Multiply Add Unit for Crypto Processors and Normalization Shifter will have less precision, but since replacement of these blocks by Barrel Shifter will result into higher precision and the latency is further reduced by 25–35?% and the total delay of Alignment Shifter and Normalization Shifter using Barrel Shifter is found to be 5.845?ns作者: 緯度 時(shí)間: 2025-3-30 23:18
Anonymizing Classification Data for Preserving Privacyoperties to achieve the objective of privacy preserving classification of data. To evaluate the effectiveness of the proposed method we have conducted experiments on real life data and proved that our method provides improved classification accuracy by preserving privacy.作者: 他一致 時(shí)間: 2025-3-31 03:37
An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANETving reliability and secure authentication in MANET. We show that proposed id based signature scheme is secure against forgery attack in the random oracle model under the Inverse-Computational Diffie-Hellman Problem (Inv-CDHP) assumption. Proposed scheme is more efficient in term of computation than作者: FORGO 時(shí)間: 2025-3-31 07:10 作者: malapropism 時(shí)間: 2025-3-31 10:31
different spheres and the elements within them related to child development and emphasizes the role of school psychologists as key players in one of the spheres within the model. Finally, it recognizes school psychologists as professionals who are well positioned to ensure children’s developmental 作者: TIA742 時(shí)間: 2025-3-31 16:12
Dapeng Xiong,Peng Zou,Jun Cai,Jun Heol psychology. Surrounding the child’s ecology, we portray the key components for professional school psychology that are critical to promotion and advocacy for child well-being: mission, guiding principles, contexts, stakeholders, domains, and roles. Within this model, we integrate child rights and作者: 暗語 時(shí)間: 2025-3-31 18:24
Doyel Pal,Praveenkumar Khethavath,Johnson P. Thomas,Tingting Chenter referred to as the Convention; United Nations, 1989) as the framework of system design for schools. The Convention meets this need because it serves as a broad framework that promotes and protects individual rights and respects cultural values. In this chapter, we demonstrate ways in which the C作者: Keshan-disease 時(shí)間: 2025-3-31 22:43 作者: Cpr951 時(shí)間: 2025-4-1 02:26