International Conference on Applications and Techniques in Information Security最新文献

筛选
英文 中文
A Memory-Efficient Multiple String Matching Algorithm Based on Charset Transformation 一种基于字符集变换的内存高效多字符串匹配算法
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_1
Yuhai Lu, Yanbing Liu, Gongxin Sun, Jianlong Tan
{"title":"A Memory-Efficient Multiple String Matching Algorithm Based on Charset Transformation","authors":"Yuhai Lu, Yanbing Liu, Gongxin Sun, Jianlong Tan","doi":"10.1007/978-981-15-0871-4_1","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_1","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123343786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Construction of Two Dimensional Cubic-Tent-Sine Map for Secure Image Transmission 用于安全图像传输的二维立方-帐篷-正弦映射的构造
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_4
S. Rajendran, Manivannan Doraipandian
{"title":"Construction of Two Dimensional Cubic-Tent-Sine Map for Secure Image Transmission","authors":"S. Rajendran, Manivannan Doraipandian","doi":"10.1007/978-981-15-0871-4_4","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_4","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131805850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ripping the Fabric: Attacks and Mitigations on Hyperledger Fabric 撕裂结构:对超级账本结构的攻击和缓解
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_24
Ahaan Dabholkar, V. Saraswat
{"title":"Ripping the Fabric: Attacks and Mitigations on Hyperledger Fabric","authors":"Ahaan Dabholkar, V. Saraswat","doi":"10.1007/978-981-15-0871-4_24","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_24","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127064424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Hardware Trojan on SIMON Architecture for Key Retrieval 基于SIMON架构的密钥检索硬件木马
International Conference on Applications and Techniques in Information Security Pub Date : 2019-11-22 DOI: 10.1007/978-981-15-0871-4_19
Sivappriya Manivannan, K. Pandian
{"title":"Hardware Trojan on SIMON Architecture for Key Retrieval","authors":"Sivappriya Manivannan, K. Pandian","doi":"10.1007/978-981-15-0871-4_19","DOIUrl":"https://doi.org/10.1007/978-981-15-0871-4_19","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132427985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Based Electronic Triage for Emergency Department 基于机器学习的急诊科电子分诊
International Conference on Applications and Techniques in Information Security Pub Date : 2018-11-09 DOI: 10.1007/978-981-13-2907-4_19
Diana Olivia, A. Nayak, Mamatha Balachandra
{"title":"Machine Learning Based Electronic Triage for Emergency Department","authors":"Diana Olivia, A. Nayak, Mamatha Balachandra","doi":"10.1007/978-981-13-2907-4_19","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4_19","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126643297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Research on Algorithms for Planted (l, d) Motif Search 植物(l, d) Motif搜索算法研究
International Conference on Applications and Techniques in Information Security Pub Date : 2018-11-09 DOI: 10.1007/978-981-13-2907-4_12
Lim AnYa
{"title":"Research on Algorithms for Planted (l, d) Motif Search","authors":"Lim AnYa","doi":"10.1007/978-981-13-2907-4_12","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4_12","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114894138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Abuse in Twitter and Online Social Networks: A Survey Twitter和在线社交网络中的信息滥用:一项调查
International Conference on Applications and Techniques in Information Security Pub Date : 2018-11-09 DOI: 10.1007/978-981-13-2907-4_5
M. Akshay, N. Mohammed, Amit Vyas, Palayil Baby Shony, Sheldon Kevin Correa
{"title":"Information Abuse in Twitter and Online Social Networks: A Survey","authors":"M. Akshay, N. Mohammed, Amit Vyas, Palayil Baby Shony, Sheldon Kevin Correa","doi":"10.1007/978-981-13-2907-4_5","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4_5","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115578767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Authentication and Key Agreement Mechanism Using PKI 基于PKI的增强认证和密钥协商机制
International Conference on Applications and Techniques in Information Security Pub Date : 2018-11-09 DOI: 10.1007/978-981-13-2907-4_4
K. Prakasha, Pratheeksha Gowda, Vasundhara Acharya, Balachandra, Mayank Khandelwal
{"title":"Enhanced Authentication and Key Agreement Mechanism Using PKI","authors":"K. Prakasha, Pratheeksha Gowda, Vasundhara Acharya, Balachandra, Mayank Khandelwal","doi":"10.1007/978-981-13-2907-4_4","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4_4","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116275501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Active Multivariate Matrix Completion 主动多元矩阵补全
International Conference on Applications and Techniques in Information Security Pub Date : 2018-11-09 DOI: 10.1007/978-981-13-2907-4_16
Tianshi Liu, Qiong Wu, Wenjuan Zhang, Xinran Cao
{"title":"Active Multivariate Matrix Completion","authors":"Tianshi Liu, Qiong Wu, Wenjuan Zhang, Xinran Cao","doi":"10.1007/978-981-13-2907-4_16","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4_16","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116727594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Subspace Learning and Sparse Regression for Feature Selection in Kernel Space 核空间特征选择的联合子空间学习与稀疏回归
International Conference on Applications and Techniques in Information Security Pub Date : 2018-11-09 DOI: 10.1007/978-981-13-2907-4_13
Long Chen, Zhi Zhong
{"title":"Joint Subspace Learning and Sparse Regression for Feature Selection in Kernel Space","authors":"Long Chen, Zhi Zhong","doi":"10.1007/978-981-13-2907-4_13","DOIUrl":"https://doi.org/10.1007/978-981-13-2907-4_13","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128008232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信