找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security; 12th International C Pierangela Samarati,Moti Yung,Claudio A. Ardagna Conference proceedings 2009 Springer-Verlag Ber

[复制链接]
查看: 33972|回复: 63
发表于 2025-3-21 19:16:15 | 显示全部楼层 |阅读模式
书目名称Information Security
副标题12th International C
编辑Pierangela Samarati,Moti Yung,Claudio A. Ardagna
视频video
丛书名称Lecture Notes in Computer Science
图书封面Titlebook: Information Security; 12th International C Pierangela Samarati,Moti Yung,Claudio A. Ardagna Conference proceedings 2009 Springer-Verlag Ber
描述.This book constitutes the refereed proceedings of the 12th International Conference on Information Security Conference, ISC 2009, held in Pisa, Italy, September 7-9, 2009...The 29 revised full papers and 9 revised short papers presented were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on analysis techniques, hash functions, database security and biometrics, algebraic attacks and proxy re-encryption, distributed system security, identity management and authentication, applied cryptography, access control, MAC and nonces, and P2P and Web services..
出版日期Conference proceedings 2009
关键词access control; algebraic attacks; anonymity; applied cryptography; authentication; behavior-based detect
版次1
doihttps://doi.org/10.1007/978-3-642-04474-8
isbn_softcover978-3-642-04473-1
isbn_ebook978-3-642-04474-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer-Verlag Berlin Heidelberg 2009
The information of publication is updating

书目名称Information Security影响因子(影响力)




书目名称Information Security影响因子(影响力)学科排名




书目名称Information Security网络公开度




书目名称Information Security网络公开度学科排名




书目名称Information Security被引频次




书目名称Information Security被引频次学科排名




书目名称Information Security年度引用




书目名称Information Security年度引用学科排名




书目名称Information Security读者反馈




书目名称Information Security读者反馈学科排名




单选投票, 共有 1 人参与投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

1票 100.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 22:55:37 | 显示全部楼层
A2M: Access-Assured Mobile Desktop Computingric traffic characteristics by using multi-path routing to send a small number of replicas of each packet transmitted from client to server. This packet replication through different paths, diversifies the client-server communication, boosting system resiliency and reducing end-to-end latency. Our a
发表于 2025-3-22 00:59:12 | 显示全部楼层
Automated Spyware Collection and Analysisb. We use three different techniques to analyze these programs: an online database of spyware-related identifiers, signature-based scanners, and a behavior-based malware detection technique. We present the results of a measurement study that lasted about ten months. During this time, we crawled over
发表于 2025-3-22 05:14:46 | 显示全部楼层
Towards Unifying Vulnerability Information for Attack Graph Constructionrectly used for generating attack graph, due to missing unification of the provided information. This paper challenged the automatic extraction of meaningful information from various existing vulnerability databases. After comparing existing vulnerability databases, a new method is proposed for auto
发表于 2025-3-22 11:36:49 | 显示全部楼层
发表于 2025-3-22 12:53:07 | 显示全部楼层
发表于 2025-3-22 18:22:15 | 显示全部楼层
Amitabh Saxena,Brecht Wyseur,Bart Preneeldeed, this problem is so crucial that those of us who are trying to systematize the principles by which large-scale organizations of . kind can be governed (e.g., . the institution of science itself) regard the problem as one of the major concerns of the discipline of Management Science.
发表于 2025-3-22 21:12:08 | 显示全部楼层
Bogdan Groza,Marius Minean he . is the one he . taken! Instead of data always guiding action, the taking of action often guides the collection of data in the sense that the proper data often cannot be uncovered except through the risking of action (Churchman, 1971)! (This point will be illustrated in the later parts of this
发表于 2025-3-23 04:16:37 | 显示全部楼层
发表于 2025-3-23 06:04:34 | 显示全部楼层
Suvasini Panigrahi,Shamik Suralnd the first-class disciplines to comb, found that the classification of construction first-class university and the first-class discipline policy model (hierarchical governance, department coordination), combined with the current classification results build first-class university and the first-cla
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-6 20:33
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表