International Symposium on Algorithms最新文献

筛选
英文 中文
Hiding Data in JPEG Using in-DQT Technique 使用in- dqt技术在JPEG中隐藏数据
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_4
Kamaruddin Malik Bin Mohamad, T. Herawan, M. M. Deris
{"title":"Hiding Data in JPEG Using in-DQT Technique","authors":"Kamaruddin Malik Bin Mohamad, T. Herawan, M. M. Deris","doi":"10.1007/978-3-642-13365-7_4","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_4","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122167524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-agent Reinforcement Learning Model for Effective Action Selection 有效行动选择的多智能体强化学习模型
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_30
Sangjo Youk, B. Lee
{"title":"Multi-agent Reinforcement Learning Model for Effective Action Selection","authors":"Sangjo Youk, B. Lee","doi":"10.1007/978-3-642-13365-7_30","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_30","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"365 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122063190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks 分布式系统或网络中问责制的同行评议分析与再评估
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_15
Zhifeng Xiao, Yang Xiao
{"title":"PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks","authors":"Zhifeng Xiao, Yang Xiao","doi":"10.1007/978-3-642-13365-7_15","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_15","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125127724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Infrastructure Aided Privacy Preserving-Authentication in VANETs vanet中的基础设施辅助隐私保护认证
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_17
B. Chaurasia, S. Verma, G. Tomar
{"title":"Infrastructure Aided Privacy Preserving-Authentication in VANETs","authors":"B. Chaurasia, S. Verma, G. Tomar","doi":"10.1007/978-3-642-13365-7_17","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_17","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132695521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Fault Attacks against the Miller's Algorithm in Edwards Coordinates Edwards坐标下Miller算法的故障攻击
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_8
Nadia El Mrabet
{"title":"Fault Attacks against the Miller's Algorithm in Edwards Coordinates","authors":"Nadia El Mrabet","doi":"10.1007/978-3-642-13365-7_8","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_8","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130015058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Improvement on a Remote User Authentication Scheme Using Smart Cards 基于智能卡的远程用户认证方案的安全性改进
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_2
Tien-Ho Chen, Han-Cheng Hsiang, W. Shih
{"title":"Security Improvement on a Remote User Authentication Scheme Using Smart Cards","authors":"Tien-Ho Chen, Han-Cheng Hsiang, W. Shih","doi":"10.1007/978-3-642-13365-7_2","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_2","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"402 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116660182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Attacks on Bluetooth Security Architecture and Its Countermeasures 蓝牙安全架构的攻击及对策
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_18
Mian Muhammad Waseem Iqbal, F. Kausar, M. A. Wahla
{"title":"Attacks on Bluetooth Security Architecture and Its Countermeasures","authors":"Mian Muhammad Waseem Iqbal, F. Kausar, M. A. Wahla","doi":"10.1007/978-3-642-13365-7_18","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_18","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"352 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122037777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Lane Design for Speed Optimization 基于速度优化的车道设计
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_10
D. Bhattacharyya, Arijit Chakraborty, Feruza Sattarova Yusufovna, Young-hun Lee, Tai-hoon Kim
{"title":"Lane Design for Speed Optimization","authors":"D. Bhattacharyya, Arijit Chakraborty, Feruza Sattarova Yusufovna, Young-hun Lee, Tai-hoon Kim","doi":"10.1007/978-3-642-13365-7_10","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_10","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128538427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensor Aided Authentication 传感器辅助认证
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_26
Xin Huang, Yang Jiang, Xiong Gao, Rong Fu, Tingting Zhang
{"title":"Sensor Aided Authentication","authors":"Xin Huang, Yang Jiang, Xiong Gao, Rong Fu, Tingting Zhang","doi":"10.1007/978-3-642-13365-7_26","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_26","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125635498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric Authentication Using Infrared Imaging of Hand Vein Patterns 利用手静脉模式的红外成像进行生物识别认证
International Symposium on Algorithms Pub Date : 2010-06-23 DOI: 10.1007/978-3-642-13365-7_11
D. Bhattacharyya, A. Shrotri, S. C. Rethrekar, M. Patil, F. Alisherov, Tai-hoon Kim
{"title":"Biometric Authentication Using Infrared Imaging of Hand Vein Patterns","authors":"D. Bhattacharyya, A. Shrotri, S. C. Rethrekar, M. Patil, F. Alisherov, Tai-hoon Kim","doi":"10.1007/978-3-642-13365-7_11","DOIUrl":"https://doi.org/10.1007/978-3-642-13365-7_11","url":null,"abstract":"","PeriodicalId":164337,"journal":{"name":"International Symposium on Algorithms","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125460507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信