International Conference on Applications and Techniques in Information Security最新文献

筛选
英文 中文
Modified Blowfish Encryption Algorithm for Wireless Body Area Network 无线体域网络改进的Blowfish加密算法
International Conference on Applications and Techniques in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-2264-2_8
S. Divya, K. Prema, Balachandra
{"title":"Modified Blowfish Encryption Algorithm for Wireless Body Area Network","authors":"S. Divya, K. Prema, Balachandra","doi":"10.1007/978-981-99-2264-2_8","DOIUrl":"https://doi.org/10.1007/978-981-99-2264-2_8","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122601404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey of BGP Anomaly Detection Using Machine Learning Techniques 基于机器学习技术的BGP异常检测综述
International Conference on Applications and Techniques in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-1166-8_9
Noor Hadi Hammood, Bahaa Al-Musawi, Ahmed Hazim Alhilali
{"title":"A Survey of BGP Anomaly Detection Using Machine Learning Techniques","authors":"Noor Hadi Hammood, Bahaa Al-Musawi, Ahmed Hazim Alhilali","doi":"10.1007/978-981-19-1166-8_9","DOIUrl":"https://doi.org/10.1007/978-981-19-1166-8_9","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120935995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Applications and Techniques in Information Security - 9th International Conference, ATIS 2018, Nanning, China, November 9-11, 2018, Proceedings 信息安全的应用与技术-第九届国际会议,ATIS 2018,中国南宁,2018年11月9-11日,论文集
International Conference on Applications and Techniques in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-13-2907-4
Qingfeng Chen, Jia Wu, Shichao Zhang, Changan Yuan, L. Batten
{"title":"Applications and Techniques in Information Security - 9th International Conference, ATIS 2018, Nanning, China, November 9-11, 2018, Proceedings","authors":"Qingfeng Chen, Jia Wu, Shichao Zhang, Changan Yuan, L. Batten","doi":"10.1007/978-981-13-2907-4","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116353411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Effects on Organisational Performance: A Local Government Perspective 云对组织绩效的影响:一个地方政府的视角
International Conference on Applications and Techniques in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-1166-8_12
P. Balasooriya, Santoso Wibowo, Marilyn A. Wells, Steven Gordon
{"title":"Cloud Effects on Organisational Performance: A Local Government Perspective","authors":"P. Balasooriya, Santoso Wibowo, Marilyn A. Wells, Steven Gordon","doi":"10.1007/978-981-19-1166-8_12","DOIUrl":"https://doi.org/10.1007/978-981-19-1166-8_12","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128319608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability Database as a Service for IoT 漏洞数据库即物联网服务
International Conference on Applications and Techniques in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-33-4706-9_7
Mark Nerwich, Praveen Gauravaram, Hye-young Paik, S. Nepal
{"title":"Vulnerability Database as a Service for IoT","authors":"Mark Nerwich, Praveen Gauravaram, Hye-young Paik, S. Nepal","doi":"10.1007/978-981-33-4706-9_7","DOIUrl":"https://doi.org/10.1007/978-981-33-4706-9_7","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117283253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Interlayer Recognition Based on Intelligent Optimization Algorithms and Convolutional Neural Networks 基于智能优化算法和卷积神经网络的层间识别研究
International Conference on Applications and Techniques in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-1166-8_2
Shaowei Pan, M. Kang, Zhipeng Guo, Haining Luo
{"title":"Research on Interlayer Recognition Based on Intelligent Optimization Algorithms and Convolutional Neural Networks","authors":"Shaowei Pan, M. Kang, Zhipeng Guo, Haining Luo","doi":"10.1007/978-981-19-1166-8_2","DOIUrl":"https://doi.org/10.1007/978-981-19-1166-8_2","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114061912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Continuously Non-malleable Codes from Authenticated Encryptions in 2-Split-State Model 2-分裂状态模型中认证加密的连续不可延性码
International Conference on Applications and Techniques in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-2264-2_3
A. Ghosal, Dipanwita Roychowdhury
{"title":"Continuously Non-malleable Codes from Authenticated Encryptions in 2-Split-State Model","authors":"A. Ghosal, Dipanwita Roychowdhury","doi":"10.1007/978-981-99-2264-2_3","DOIUrl":"https://doi.org/10.1007/978-981-99-2264-2_3","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126904747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flow-Based Intrusion Detection Systems: A Survey 基于流的入侵检测系统综述
International Conference on Applications and Techniques in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-1166-8_10
A. Al-Bakaa, Bahaa Al-Musawi
{"title":"Flow-Based Intrusion Detection Systems: A Survey","authors":"A. Al-Bakaa, Bahaa Al-Musawi","doi":"10.1007/978-981-19-1166-8_10","DOIUrl":"https://doi.org/10.1007/978-981-19-1166-8_10","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115432147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme 基于Shamir阈值秘密共享方案的前向安全连接关键字可搜索对称加密
International Conference on Applications and Techniques in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-33-4706-9_2
Lin Li, Chungen Xu, Zhongyi Liu, Lin Mei
{"title":"Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme","authors":"Lin Li, Chungen Xu, Zhongyi Liu, Lin Mei","doi":"10.1007/978-981-33-4706-9_2","DOIUrl":"https://doi.org/10.1007/978-981-33-4706-9_2","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134436678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output 基于抽取输出的线性滤波nfsr攻击识别
International Conference on Applications and Techniques in Information Security Pub Date : 1900-01-01 DOI: 10.1007/978-981-33-4706-9_4
Matthew Beighton, Harry Bartlett, L. Simpson, Kenneth Koon-Ho Wong
{"title":"Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output","authors":"Matthew Beighton, Harry Bartlett, L. Simpson, Kenneth Koon-Ho Wong","doi":"10.1007/978-981-33-4706-9_4","DOIUrl":"https://doi.org/10.1007/978-981-33-4706-9_4","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132618026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信