Advances in Information Security最新文献

筛选
英文 中文
Protecting Privacy in Data Release 数据发布中的隐私保护
Advances in Information Security Pub Date : 2015-05-18 DOI: 10.1007/978-3-319-16109-9
S. Vimercati, S. Foresti, G. Livraga, P. Samarati
{"title":"Protecting Privacy in Data Release","authors":"S. Vimercati, S. Foresti, G. Livraga, P. Samarati","doi":"10.1007/978-3-319-16109-9","DOIUrl":"https://doi.org/10.1007/978-3-319-16109-9","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124805410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Cyber Defense and Situational Awareness 网络防御和态势感知
Advances in Information Security Pub Date : 2015-01-06 DOI: 10.1007/978-3-319-11391-3
A. Kott, Cliff X. Wang, R. Erbacher
{"title":"Cyber Defense and Situational Awareness","authors":"A. Kott, Cliff X. Wang, R. Erbacher","doi":"10.1007/978-3-319-11391-3","DOIUrl":"https://doi.org/10.1007/978-3-319-11391-3","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123122181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Touchless Palmprint Recognition Systems 非接触式掌纹识别系统
Advances in Information Security Pub Date : 2014-09-15 DOI: 10.1007/978-3-319-10365-5
{"title":"Touchless Palmprint Recognition Systems","authors":"","doi":"10.1007/978-3-319-10365-5","DOIUrl":"https://doi.org/10.1007/978-3-319-10365-5","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133757055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Network Science and Cybersecurity 网络科学与网络安全
Advances in Information Security Pub Date : 2013-06-27 DOI: 10.1007/978-1-4614-7597-2
R. Pino
{"title":"Network Science and Cybersecurity","authors":"R. Pino","doi":"10.1007/978-1-4614-7597-2","DOIUrl":"https://doi.org/10.1007/978-1-4614-7597-2","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125001726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Electronic Healthcare Information Security 电子医疗信息安全
Advances in Information Security Pub Date : 2010-11-03 DOI: 10.1007/978-0-387-84919-5
C. Shoniregun, Kudakwashe Dube, F. Mtenzi
{"title":"Electronic Healthcare Information Security","authors":"C. Shoniregun, Kudakwashe Dube, F. Mtenzi","doi":"10.1007/978-0-387-84919-5","DOIUrl":"https://doi.org/10.1007/978-0-387-84919-5","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123172454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Encryption for Digital Content 数字内容加密
Advances in Information Security Pub Date : 2010-11-02 DOI: 10.1007/978-1-4419-0044-9
A. Kiayias, Serdar Pehlivanoglu
{"title":"Encryption for Digital Content","authors":"A. Kiayias, Serdar Pehlivanoglu","doi":"10.1007/978-1-4419-0044-9","DOIUrl":"https://doi.org/10.1007/978-1-4419-0044-9","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122190902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Preserving Privacy in Data Outsourcing 保护数据外判的私隐
Advances in Information Security Pub Date : 2010-10-13 DOI: 10.1007/978-1-4419-7659-8
S. Foresti
{"title":"Preserving Privacy in Data Outsourcing","authors":"S. Foresti","doi":"10.1007/978-1-4419-7659-8","DOIUrl":"https://doi.org/10.1007/978-1-4419-7659-8","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123489149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Spyware and Adware 间谍软件和广告软件
Advances in Information Security Pub Date : 2010-09-23 DOI: 10.1007/978-0-387-77741-2
John Aycock
{"title":"Spyware and Adware","authors":"John Aycock","doi":"10.1007/978-0-387-77741-2","DOIUrl":"https://doi.org/10.1007/978-0-387-77741-2","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133131698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Adaptive Cryptographic Access Control 自适应密码访问控制
Advances in Information Security Pub Date : 2010-08-16 DOI: 10.1007/978-1-4419-6655-1
Anne Kayem, S. Akl, Patrick Martin
{"title":"Adaptive Cryptographic Access Control","authors":"Anne Kayem, S. Akl, Patrick Martin","doi":"10.1007/978-1-4419-6655-1","DOIUrl":"https://doi.org/10.1007/978-1-4419-6655-1","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134080407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Network Intrusion Detection and Prevention - Concepts and Techniques 网络入侵检测和防御-概念和技术
Advances in Information Security Pub Date : 2009-10-28 DOI: 10.1007/978-0-387-88771-5
A. Ghorbani, Wei Lu, Mahbod Tavallaee
{"title":"Network Intrusion Detection and Prevention - Concepts and Techniques","authors":"A. Ghorbani, Wei Lu, Mahbod Tavallaee","doi":"10.1007/978-0-387-88771-5","DOIUrl":"https://doi.org/10.1007/978-0-387-88771-5","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125002205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 147
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信