找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Advances in Intelligent Systems and Applications - Volume 2; Proceedings of the I Jeng-Shyang Pan,Ching-Nung Yang,Chia-Chen Lin Conference

[复制链接]
查看: 22799|回复: 59
发表于 2025-3-21 16:20:55 | 显示全部楼层 |阅读模式
期刊全称Advances in Intelligent Systems and Applications - Volume 2
期刊简称Proceedings of the I
影响因子2023Jeng-Shyang Pan,Ching-Nung Yang,Chia-Chen Lin
视频video
发行地址Presents recent research Intelligent Systems and Applications.Results in the field of Intelligent Systems coming from the ICS 2012 symposium held December 12-14, 2012 in Hualien, Taiwan.Written by exp
学科分类Smart Innovation, Systems and Technologies
图书封面Titlebook: Advances in Intelligent Systems and Applications - Volume 2; Proceedings of the I Jeng-Shyang Pan,Ching-Nung Yang,Chia-Chen Lin Conference
影响因子. .The field of Intelligent Systems and Applications has expanded enormously during the last two decades. Theoretical and practical results in this area are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide highlights of the current research in Intelligent Systems and Applications. It consists of research papers in the following specific topics:. .l   Authentication, Identification, and Signature.l   Intrusion Detection.l   Steganography, Data Hiding, and Watermarking.l   Database, System, and Communication Security.l   Computer Vision, Object Tracking, and Pattern Recognition.l   Image Processing, Medical Image Processing, and Video Coding.l  Digital Content, Digital Life, and Human Computer Interaction.l   Parallel, Peer-to-peer, Distributed, and Cloud Computing.l   Software Engineering and Programming Language. .This book provides a reference to theoretical problems as well as practical solutions and applications for the state-of-the-art results in Intelligent Systems and Applications on the af
Pindex Conference proceedings 2013
The information of publication is updating

书目名称Advances in Intelligent Systems and Applications - Volume 2影响因子(影响力)




书目名称Advances in Intelligent Systems and Applications - Volume 2影响因子(影响力)学科排名




书目名称Advances in Intelligent Systems and Applications - Volume 2网络公开度




书目名称Advances in Intelligent Systems and Applications - Volume 2网络公开度学科排名




书目名称Advances in Intelligent Systems and Applications - Volume 2被引频次




书目名称Advances in Intelligent Systems and Applications - Volume 2被引频次学科排名




书目名称Advances in Intelligent Systems and Applications - Volume 2年度引用




书目名称Advances in Intelligent Systems and Applications - Volume 2年度引用学科排名




书目名称Advances in Intelligent Systems and Applications - Volume 2读者反馈




书目名称Advances in Intelligent Systems and Applications - Volume 2读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 21:23:10 | 显示全部楼层
A Dynamic Approach to Hash-Based Privacy-Preserving RFID Protocols,ctive adversary can not only track a tag via successful or unsuccessful identifications with legal or illegal readers but also perform a compromised attack. In . 2003, Weis et al. used the technique of the randomized hash lock to design a privacy-preserving protocol against such active adversaries.
发表于 2025-3-22 03:31:51 | 显示全部楼层
发表于 2025-3-22 05:46:28 | 显示全部楼层
Cryptanalysis on the User Authentication Scheme with Anonymity,sers obtain services only after they are authenticated. Remote user authentication scheme provides the server a convenient way to authenticate users before they are allowed to access database and obtain services. For the sake of security, anonymity is an important requirement for some user authentic
发表于 2025-3-22 10:30:56 | 显示全部楼层
Deniable Authentication Protocols with Confidentiality and Anonymous Fair Protections, no non-interactive deniable authentication protocols are proposed to provide anonymity and fair protection both for senders and receivers. A noninteractive deniable authentication protocol with anonymity and fair protection is proposed to improve performance. Moreover, our protocol provides confide
发表于 2025-3-22 13:02:03 | 显示全部楼层
发表于 2025-3-22 19:48:05 | 显示全部楼层
发表于 2025-3-23 00:58:58 | 显示全部楼层
Impact of Identifier-Locator Split Mechanism on DDoS Attacks, hindering the development of current Internet. Therefore, the identifier-locator split mapping network which separates the identifier role and the locator role of an IP address has become one of the most-watched techniques in the field of future Internet architecture. However, DDoS attacks are stil
发表于 2025-3-23 03:45:24 | 显示全部楼层
Detecting Web-Based Botnets with Fast-Flux Domains, malicious transmissions in a vast amount of normal traffic that is not easily detectable. In addition, integrating with fast-flux domain technology, botnet may use a web server to issue attack commands and fast-flux technology to extend the lifespan of the malicious website. This study conducts ano
发表于 2025-3-23 08:20:07 | 显示全部楼层
Improvements of Attack-Defense Trees for Threat Analysis,nt. Therefore, Protection Trees (PT) have been developed to migrate the system weaknesses against attacks. However, existing protection trees scheme provided a converse approach to counter against attacks, ignored the interactions between threats and defenses. Accordingly, the present study proposes
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-14 12:57
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表