Advances in Information Security最新文献

筛选
英文 中文
Security for Wireless Sensor Networks 无线传感器网络的安全性
Advances in Information Security Pub Date : 2006-11-09 DOI: 10.1007/978-0-387-46781-8
Donggang Liu, P. Ning
{"title":"Security for Wireless Sensor Networks","authors":"Donggang Liu, P. Ning","doi":"10.1007/978-0-387-46781-8","DOIUrl":"https://doi.org/10.1007/978-0-387-46781-8","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123201014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
Preserving Privacy in On-Line Analytical Processing (OLAP) 联机分析处理(OLAP)中的隐私保护
Advances in Information Security Pub Date : 2006-11-01 DOI: 10.1007/978-0-387-46274-5
Lingyu Wang, S. Jajodia, D. Wijesekera
{"title":"Preserving Privacy in On-Line Analytical Processing (OLAP)","authors":"Lingyu Wang, S. Jajodia, D. Wijesekera","doi":"10.1007/978-0-387-46274-5","DOIUrl":"https://doi.org/10.1007/978-0-387-46274-5","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114186033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 无线传感器和自组织网络的安全定位和时间同步
Advances in Information Security Pub Date : 2006-11-01 DOI: 10.1007/978-0-387-46276-9
R. Poovendran, Cliff X. Wang, Sumit Roy
{"title":"Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks","authors":"R. Poovendran, Cliff X. Wang, Sumit Roy","doi":"10.1007/978-0-387-46276-9","DOIUrl":"https://doi.org/10.1007/978-0-387-46276-9","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131447899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 101
Computer Viruses and Malware 电脑病毒及恶意软件
Advances in Information Security Pub Date : 2006-07-20 DOI: 10.1007/0-387-34188-9
John Aycock
{"title":"Computer Viruses and Malware","authors":"John Aycock","doi":"10.1007/0-387-34188-9","DOIUrl":"https://doi.org/10.1007/0-387-34188-9","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122295062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 218
Understanding Intrusion Detection Through Visualization 通过可视化理解入侵检测
Advances in Information Security Pub Date : 2005-11-21 DOI: 10.1007/0-387-27636-X
Stefan Axelsson, David Sands
{"title":"Understanding Intrusion Detection Through Visualization","authors":"Stefan Axelsson, David Sands","doi":"10.1007/0-387-27636-X","DOIUrl":"https://doi.org/10.1007/0-387-27636-X","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116321843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Hop Integrity in the Internet Internet中的跳完整性
Advances in Information Security Pub Date : 2005-11-17 DOI: 10.1007/0-387-29444-9
Chin-Tser Huang, M. Gouda
{"title":"Hop Integrity in the Internet","authors":"Chin-Tser Huang, M. Gouda","doi":"10.1007/0-387-29444-9","DOIUrl":"https://doi.org/10.1007/0-387-29444-9","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122256686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Biometric User Authentication for it Security - From Fundamentals to Handwriting 生物识别用户认证为它的安全-从基础到手写
Advances in Information Security Pub Date : 2005-08-01 DOI: 10.1007/0-387-28094-4
C. Vielhauer
{"title":"Biometric User Authentication for it Security - From Fundamentals to Handwriting","authors":"C. Vielhauer","doi":"10.1007/0-387-28094-4","DOIUrl":"https://doi.org/10.1007/0-387-28094-4","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127684554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 139
Impacts and Risk Assessment of Technology for Internet Security - Enabled Information Small-Medium Enterprises (TEISMES) 资讯保安科技对中小型企业的影响及风险评估(TEISMES)
Advances in Information Security Pub Date : 2005-06-01 DOI: 10.1007/b137376
C. Shoniregun
{"title":"Impacts and Risk Assessment of Technology for Internet Security - Enabled Information Small-Medium Enterprises (TEISMES)","authors":"C. Shoniregun","doi":"10.1007/b137376","DOIUrl":"https://doi.org/10.1007/b137376","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129802960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
The Austin Protocol Compiler Austin协议编译器
Advances in Information Security Pub Date : 2004-11-19 DOI: 10.1007/b101038
Tommy M. McGuire, M. Gouda
{"title":"The Austin Protocol Compiler","authors":"Tommy M. McGuire, M. Gouda","doi":"10.1007/b101038","DOIUrl":"https://doi.org/10.1007/b101038","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115775804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Primality Testing and Integer Factorization in Public-Key Cryptography 公钥密码中的素数检验与整数分解
Advances in Information Security Pub Date : 2003-11-30 DOI: 10.1007/978-1-4757-3816-2
S. Yan
{"title":"Primality Testing and Integer Factorization in Public-Key Cryptography","authors":"S. Yan","doi":"10.1007/978-1-4757-3816-2","DOIUrl":"https://doi.org/10.1007/978-1-4757-3816-2","url":null,"abstract":"","PeriodicalId":141746,"journal":{"name":"Advances in Information Security","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133811510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信