找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Intelligence and Security Informatics; Pacific Asia Worksho Michael Chau,G. Alan Wang,Hsinchun Chen Conference proceedings 2012 Springer-Ve

[复制链接]
楼主: FAD
发表于 2025-3-25 03:53:58 | 显示全部楼层
Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short Traed in prime order groups model. Under assumed standard model, our proposed schemes achieve higher computation efficiency and shorter ciphertext/trapdoor, which have flexible applications in multiple keywords search and filter such as email filtering, firewall and copyright protection.
发表于 2025-3-25 11:17:40 | 显示全部楼层
A Simultaneous Members Enrollment and Revocation Protocol for Secret Sharing Schemesing and revoking members simultaneously in a secret sharing scheme. Compared with previous protocols, our protocol can accomplish a new member’s enrollment and an old member’s revocation in fewer rounds. This protocol is especially useful for the circumstances where members join and leave secret sharing system frequently such as ad hoc networks.
发表于 2025-3-25 13:35:04 | 显示全部楼层
Cloud-Centric Assured Information Sharingt implementation of a centralized cloud-based assured information sharing system and the design of a decentralized hybrid cloud-based assured information sharing system of the future. Our goal is for coalition organizations to share information stored in multiple clouds and enforce appropriate polic
发表于 2025-3-25 17:40:13 | 显示全部楼层
Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Regionnflict massive damage. There have been numerous studies by researchers in Europe, the Middle East and North America in analyzing the illicit activities and terrorism in cyberspace. However, there are limited studies on similar cases in the Southeast Asian region. This paper presents an exploratory r
发表于 2025-3-25 20:03:14 | 显示全部楼层
CybercrimeIR – A Technological Perspective to Fight Cybercrimeis urgent need for fighting cybercrime internationally. This study proposes a feasible architecture of CybercrimeIR to collect and classify the useful cybercrime materials in investigator’s perspective. In the experiments, this study firstly adopts text representation approaches and machine learning
发表于 2025-3-26 01:24:13 | 显示全部楼层
Information Credibility on Twitter in Emergency Situationruthful, but as some people post the rumors and spams on Twitter in emergence situation, the direction of public opinion can be misled and even the riots are caused. In this paper, we focus on the methods for the information credibility in emergency situation. More precisely, we build a novel Twitte
发表于 2025-3-26 08:13:07 | 显示全部楼层
发表于 2025-3-26 10:42:57 | 显示全部楼层
发表于 2025-3-26 13:08:32 | 显示全部楼层
发表于 2025-3-26 18:02:35 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-19 20:19
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表