International Symposium on Algorithms最新文献

筛选
英文 中文
Application Program Interface as Back-Up Data Source for SCADA Systems 应用程序接口作为SCADA系统的备份数据源
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_21
R. J. Robles, Tai-hoon Kim
{"title":"Application Program Interface as Back-Up Data Source for SCADA Systems","authors":"R. J. Robles, Tai-hoon Kim","doi":"10.1007/978-3-642-23141-4_21","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_21","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134029355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent Clustering Method for Highly Similar Digital Photos Using Pyramid Matching with Human Perceptual 25 Color Histogram 基于人类感知25色直方图的高相似度数字照片智能聚类方法
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_37
Dong-Sung Ryu, Kwanghwi Kim, Hwan-Gue Cho
{"title":"An Intelligent Clustering Method for Highly Similar Digital Photos Using Pyramid Matching with Human Perceptual 25 Color Histogram","authors":"Dong-Sung Ryu, Kwanghwi Kim, Hwan-Gue Cho","doi":"10.1007/978-3-642-23141-4_37","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_37","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132103289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Study for Security Scheme and the Right to Be Forgotten Based on Social Network Service for Smart-Phone Environment 智能手机环境下基于社交网络服务的安全方案与被遗忘权研究
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_33
Jang-Mook Kang, You-Jin Song, J. Cha, Seon-Hee Lee
{"title":"A Study for Security Scheme and the Right to Be Forgotten Based on Social Network Service for Smart-Phone Environment","authors":"Jang-Mook Kang, You-Jin Song, J. Cha, Seon-Hee Lee","doi":"10.1007/978-3-642-23141-4_33","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_33","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130985136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Private Registry Management System Using DHT Based on FIPA Agent Platform 基于FIPA代理平台的DHT私有注册管理系统
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_28
Seung-Hyun Lee, Kyung-Soo Jang, Kee-Hyun Choi, Choon-Sung Nam, D. Shin
{"title":"An Efficient Private Registry Management System Using DHT Based on FIPA Agent Platform","authors":"Seung-Hyun Lee, Kyung-Soo Jang, Kee-Hyun Choi, Choon-Sung Nam, D. Shin","doi":"10.1007/978-3-642-23141-4_28","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_28","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128328177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recent Progress in Code-Based Cryptography 基于代码的密码学的最新进展
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_3
Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Gerhard Hoffmann, M. Meziani, Robert Niebuhr
{"title":"Recent Progress in Code-Based Cryptography","authors":"Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui, Gerhard Hoffmann, M. Meziani, Robert Niebuhr","doi":"10.1007/978-3-642-23141-4_3","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_3","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122158336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Towards Algebraic Cryptanalysis of HFE Challenge 2 HFE的代数密码分析挑战2
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_12
M. S. Mohamed, Jintai Ding, J. Buchmann
{"title":"Towards Algebraic Cryptanalysis of HFE Challenge 2","authors":"M. S. Mohamed, Jintai Ding, J. Buchmann","doi":"10.1007/978-3-642-23141-4_12","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_12","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130218645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis 用于静态平台无关恶意软件分析的可重定向反编译器的设计
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_8
Lukás Durfina, J. Kroustek, Petr Zemek, D. Kolář, Tomás Hruska, Karel Masarík, A. Meduna
{"title":"Design of a Retargetable Decompiler for a Static Platform-Independent Malware Analysis","authors":"Lukás Durfina, J. Kroustek, Petr Zemek, D. Kolář, Tomás Hruska, Karel Masarík, A. Meduna","doi":"10.1007/978-3-642-23141-4_8","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_8","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134102524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Equivalent Key Recovery Attack on H 2-MAC Instantiated with MD5 MD5实例化H - mac的等效密钥恢复攻击
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_2
Wei Wang
{"title":"Equivalent Key Recovery Attack on H 2-MAC Instantiated with MD5","authors":"Wei Wang","doi":"10.1007/978-3-642-23141-4_2","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_2","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114858614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
S-FSB: An Improved Variant of the FSB Hash Family S-FSB: FSB哈希家族的改进变体
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_13
M. Meziani, Özgür Dagdelen, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui
{"title":"S-FSB: An Improved Variant of the FSB Hash Family","authors":"M. Meziani, Özgür Dagdelen, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui","doi":"10.1007/978-3-642-23141-4_13","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_13","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122814444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
2SC: An Efficient Code-Based Stream Cipher 一种高效的基于码的流密码
International Symposium on Algorithms Pub Date : 2011-08-15 DOI: 10.1007/978-3-642-23141-4_11
M. Meziani, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui
{"title":"2SC: An Efficient Code-Based Stream Cipher","authors":"M. Meziani, Pierre-Louis Cayrel, Sidi Mohamed El Yousfi Alaoui","doi":"10.1007/978-3-642-23141-4_11","DOIUrl":"https://doi.org/10.1007/978-3-642-23141-4_11","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132844830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信