International Symposium on Algorithms最新文献

筛选
英文 中文
A Detrministic Factorization and Primality Testing Algorithm for Integers of the Form Z Mod 6 = -1 Z - mod6 = -1型整数的确定性分解与素数检验算法
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_15
N. Noureldien, Mahmud Awadelkariem, DeiaEldien M. Ahmed
{"title":"A Detrministic Factorization and Primality Testing Algorithm for Integers of the Form Z Mod 6 = -1","authors":"N. Noureldien, Mahmud Awadelkariem, DeiaEldien M. Ahmed","doi":"10.1007/978-3-642-23141-4_15","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_15","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114792745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Congestion Control Design for Input Time Delayed AQM System 输入时滞AQM系统的鲁棒拥塞控制设计
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_36
Ji Hoon Yang, Seung-Jung Shin, Dong-Kyun Lim, J. Kang
{"title":"Robust Congestion Control Design for Input Time Delayed AQM System","authors":"Ji Hoon Yang, Seung-Jung Shin, Dong-Kyun Lim, J. Kang","doi":"10.1007/978-3-642-23141-4_36","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_36","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"59 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125743468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems 入侵检测系统中的多步攻击检测与告警关联
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_10
Fabio Manganiello, Mirco Marchetti, M. Colajanni
{"title":"Multistep Attack Detection and Alert Correlation in Intrusion Detection Systems","authors":"Fabio Manganiello, Mirco Marchetti, M. Colajanni","doi":"10.1007/978-3-642-23141-4_10","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_10","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125746393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Towards Next Generation System Architecture for Emergency Services 面向下一代应急服务系统架构
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_18
J. Veijalainen, Veikko Hara
{"title":"Towards Next Generation System Architecture for Emergency Services","authors":"J. Veijalainen, Veikko Hara","doi":"10.1007/978-3-642-23141-4_18","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_18","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134379909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Supervisory Control and Data Acquisition System CAIN Issues 监控和数据采集系统CAIN问题
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_43
Maricel O. Balitanas, Tai-hoon Kim
{"title":"Supervisory Control and Data Acquisition System CAIN Issues","authors":"Maricel O. Balitanas, Tai-hoon Kim","doi":"10.1007/978-3-642-23141-4_43","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_43","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122156843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes 基于准双进Goppa码的改进身份识别与签名方案
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_14
Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, M. Meziani
{"title":"Improved Identity-Based Identification and Signature Schemes Using Quasi-Dyadic Goppa Codes","authors":"Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, M. Meziani","doi":"10.1007/978-3-642-23141-4_14","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_14","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130550447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Data Management Method to Secure Data in Cloud Computing Environment 云计算环境下数据安全的一种数据管理方法
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_31
You-Jin Song, J. Cha, Jang-Mook Kang, W. kim
{"title":"A Data Management Method to Secure Data in Cloud Computing Environment","authors":"You-Jin Song, J. Cha, Jang-Mook Kang, W. kim","doi":"10.1007/978-3-642-23141-4_31","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_31","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126232116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secret Key Awareness Security Public Key Encryption Scheme 密钥感知安全公钥加密方案
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_6
Guoyan Zhang, Qiuliang Xu
{"title":"Secret Key Awareness Security Public Key Encryption Scheme","authors":"Guoyan Zhang, Qiuliang Xu","doi":"10.1007/978-3-642-23141-4_6","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_6","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133774252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart Phone 面向用户的基于智能手机一次性密码机制的伪生物识别图像
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_42
Wonjun Jang, Sikwan Cho, Hyung-Woo Lee
{"title":"User-Oriented Pseudo Biometric Image Based One-Time Password Mechanism on Smart Phone","authors":"Wonjun Jang, Sikwan Cho, Hyung-Woo Lee","doi":"10.1007/978-3-642-23141-4_42","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_42","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116538042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Scheme for Role-Based 3D CCTV Using CS-RBAC (Context-Sensitivity Role-Based Access Control) 基于CS-RBAC(上下文敏感的基于角色的访问控制)的基于角色的3D CCTV方案
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_39
Jang-Mook Kang, J. Cha, You-Jin Song, Goo-Man Park, Eun-Young Ko, Myong-chul Shin, J. Kang, YouSik Hong
{"title":"A Scheme for Role-Based 3D CCTV Using CS-RBAC (Context-Sensitivity Role-Based Access Control)","authors":"Jang-Mook Kang, J. Cha, You-Jin Song, Goo-Man Park, Eun-Young Ko, Myong-chul Shin, J. Kang, YouSik Hong","doi":"10.1007/978-3-642-23141-4_39","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_39","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124170247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信