找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security Applications; 20th International C Ilsun You Conference proceedings 2020 Springer Nature Switzerland AG 2020 formal me

[复制链接]
查看: 51511|回复: 58
发表于 2025-3-21 20:07:32 | 显示全部楼层 |阅读模式
书目名称Information Security Applications
副标题20th International C
编辑Ilsun You
视频video
丛书名称Lecture Notes in Computer Science
图书封面Titlebook: Information Security Applications; 20th International C Ilsun You Conference proceedings 2020 Springer Nature Switzerland AG 2020 formal me
描述.This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Information Security Applications, WISA 2019, held on Jeju Island, South Korea, in August 2019. The 29 revised full papers presented in this volume were carefully reviewed and selected from 63 submissions...The primary focus of WISA 2019 was on systems and network security including all other technical and practical aspects of security application in general. The papers are grouped in the following topical sections: Application and Game Security; Network Security and Blockchain; Cryptography; Security with AI and Machine Learning; IoT Security; Hardware Security; and Selected Security Issues..
出版日期Conference proceedings 2020
关键词formal methods and theory of security; security services; software and application security; network se
版次1
doihttps://doi.org/10.1007/978-3-030-39303-8
isbn_softcover978-3-030-39302-1
isbn_ebook978-3-030-39303-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer Nature Switzerland AG 2020
The information of publication is updating

书目名称Information Security Applications影响因子(影响力)




书目名称Information Security Applications影响因子(影响力)学科排名




书目名称Information Security Applications网络公开度




书目名称Information Security Applications网络公开度学科排名




书目名称Information Security Applications被引频次




书目名称Information Security Applications被引频次学科排名




书目名称Information Security Applications年度引用




书目名称Information Security Applications年度引用学科排名




书目名称Information Security Applications读者反馈




书目名称Information Security Applications读者反馈学科排名




单选投票, 共有 1 人参与投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

1票 100.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 22:49:43 | 显示全部楼层
Turn On the Lights: User Behavior in Game Environment Using CPTEDter (FPS) to garner much attention. Both MMORPG and FPS requires lower network latency, as the users are constantly required to assess and respond to the gaming environment and other users’ decisions. Our study aims to investigate the users’ psychological behavior by changing the gaming environment.
发表于 2025-3-22 00:58:21 | 显示全部楼层
QR Code Watermarking for Digital Imagesniques like digital watermarking can be used to embed data within a signal for purposes such as digital rights management. This paper investigates a watermarking technique for digital images using QR codes. The advantage of using QR codes for watermarking is that properties of the QR code structure
发表于 2025-3-22 06:27:13 | 显示全部楼层
FSF: Code Coverage-Driven Fuzzing for Software-Defined Networkingudies focus on eliciting bugs in such SDN controller via penetration testing or fuzzing without considering code coverage feedback from a target controller under testing. We propose FSF, a code coverage-driven SDN fuzzer. We designed and implemented a fuzzing algorithm to take into account coverage
发表于 2025-3-22 12:34:43 | 显示全部楼层
DroPPPP: A P4 Approach to Mitigating DoS Attacks in SDNployment of services in the past decade. Despite these advantages, the fact that the functionality of SDN relies heavily on the controller with a much less capable data plane creates a single point of failure, which leaves the network susceptible to denial of service (DoS) attacks mainly targeting t
发表于 2025-3-22 13:48:39 | 显示全部楼层
A Secure and Self-tallying E-voting System Based on Blockchainbecause of its properties of tamper resistance and transparency. However, existing schemes either require centralized authorities to tally ballots or can only handle a limited number of voters. This paper tries to propose a self-tallying e-voting system, i.e., the public can verify the validity of a
发表于 2025-3-22 19:29:59 | 显示全部楼层
An Extended CTRT for AES-256 model. Though AES-128 whose key length . and block length . can be used in CTRT as a block cipher, AES-256 cannot be used in CTRT due to its intrinsic restriction of .. According to a recent ECRYPT-CSA report, AES-256 is strongly recommended rather than AES-128 for long term protection (security fo
发表于 2025-3-22 23:04:10 | 显示全部楼层
A Blind Ring Signature Based on the Short Integer Solution Problemgn on a message on behalf of the group without revealing its identity but also the user who possesses the message to blind it before sending to the group to be signed. Blind ring signature schemes are essential components in e-commercial, e-voting etc. In this paper, we propose the first blind ring
发表于 2025-3-23 03:38:48 | 显示全部楼层
A Note on the Invisibility and Anonymity of Undeniable Signature Schemesfy invisibility which implies the inability of a user to determine the validity of a message and signature pair as introduced by Chaum et al. Galbraith and Mao later proposed the notion of anonymity which implies the infeasibility to determine which user has issued the signature. They also proved th
发表于 2025-3-23 05:53:38 | 显示全部楼层
Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with rupt the secret signing keys. Secret signing keys of VLR schemes consist of tokens which can be used to identify the users. Thus VLR schemes restrict corrupting secret signing keys. VLR schemes can achieve full-anonymity by separating tokens from secret signing keys. However, separation of tokens gi
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-25 03:59
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表