Asian Computing Science Conference最新文献

筛选
英文 中文
Scalable DRM System for Media Portability 媒体可移植性的可扩展DRM系统
Asian Computing Science Conference Pub Date : 2007-12-09 DOI: 10.1007/978-3-540-76929-3_9
Hyoungshick Kim
{"title":"Scalable DRM System for Media Portability","authors":"Hyoungshick Kim","doi":"10.1007/978-3-540-76929-3_9","DOIUrl":"https://doi.org/10.1007/978-3-540-76929-3_9","url":null,"abstract":"","PeriodicalId":194921,"journal":{"name":"Asian Computing Science Conference","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125431166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces metasploit相关攻击4年攻击轨迹影响的实证研究
Asian Computing Science Conference Pub Date : 2007-12-09 DOI: 10.1007/978-3-540-76929-3_19
E. Ramirez-Silva, M. Dacier
{"title":"Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces","authors":"E. Ramirez-Silva, M. Dacier","doi":"10.1007/978-3-540-76929-3_19","DOIUrl":"https://doi.org/10.1007/978-3-540-76929-3_19","url":null,"abstract":"","PeriodicalId":194921,"journal":{"name":"Asian Computing Science Conference","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132929222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Static vs Dynamic Typing for Access Control in Pi-Calculus Pi-Calculus中访问控制的静态与动态类型
Asian Computing Science Conference Pub Date : 2007-12-09 DOI: 10.1007/978-3-540-76929-3_27
M. Bugliesi, Damiano Macedonio, S. Rossi
{"title":"Static vs Dynamic Typing for Access Control in Pi-Calculus","authors":"M. Bugliesi, Damiano Macedonio, S. Rossi","doi":"10.1007/978-3-540-76929-3_27","DOIUrl":"https://doi.org/10.1007/978-3-540-76929-3_27","url":null,"abstract":"","PeriodicalId":194921,"journal":{"name":"Asian Computing Science Conference","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127631340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Verification of Location Claims with Simultaneous Distance Modification 同时修改距离的位置声明的安全验证
Asian Computing Science Conference Pub Date : 2007-12-09 DOI: 10.1007/978-3-540-76929-3_17
Vitaly Shmatikov, Ming-Hsiu Wang
{"title":"Secure Verification of Location Claims with Simultaneous Distance Modification","authors":"Vitaly Shmatikov, Ming-Hsiu Wang","doi":"10.1007/978-3-540-76929-3_17","DOIUrl":"https://doi.org/10.1007/978-3-540-76929-3_17","url":null,"abstract":"","PeriodicalId":194921,"journal":{"name":"Asian Computing Science Conference","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122364291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications 基于应用程序执行上下文的动态策略沙盒
Asian Computing Science Conference Pub Date : 2007-12-09 DOI: 10.1007/978-3-540-76929-3_28
T. Shioya, Y. Oyama, H. Iwasaki
{"title":"A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications","authors":"T. Shioya, Y. Oyama, H. Iwasaki","doi":"10.1007/978-3-540-76929-3_28","DOIUrl":"https://doi.org/10.1007/978-3-540-76929-3_28","url":null,"abstract":"","PeriodicalId":194921,"journal":{"name":"Asian Computing Science Conference","volume":"62 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133286994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Digital Rights Management Using a Master Control Device 使用主控制设备的数字版权管理
Asian Computing Science Conference Pub Date : 2007-12-09 DOI: 10.1007/978-3-540-76929-3_13
I. Abbadi
{"title":"Digital Rights Management Using a Master Control Device","authors":"I. Abbadi","doi":"10.1007/978-3-540-76929-3_13","DOIUrl":"https://doi.org/10.1007/978-3-540-76929-3_13","url":null,"abstract":"","PeriodicalId":194921,"journal":{"name":"Asian Computing Science Conference","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122578052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
One-Time Receiver Address in IPv6 for Protecting Unlinkability IPv6中保护不可连通性的一次性接收地址
Asian Computing Science Conference Pub Date : 2007-12-09 DOI: 10.1007/978-3-540-76929-3_22
Atsushi Sakurai, T. Minohara, Ryota Sato, Keisuke Mizutani
{"title":"One-Time Receiver Address in IPv6 for Protecting Unlinkability","authors":"Atsushi Sakurai, T. Minohara, Ryota Sato, Keisuke Mizutani","doi":"10.1007/978-3-540-76929-3_22","DOIUrl":"https://doi.org/10.1007/978-3-540-76929-3_22","url":null,"abstract":"","PeriodicalId":194921,"journal":{"name":"Asian Computing Science Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117301537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Large Scale Simulation of Tor: Tor的大规模模拟
Asian Computing Science Conference Pub Date : 2007-12-09 DOI: 10.1007/978-3-540-76929-3_5
G. O'Gorman, Stephen Blott
{"title":"Large Scale Simulation of Tor:","authors":"G. O'Gorman, Stephen Blott","doi":"10.1007/978-3-540-76929-3_5","DOIUrl":"https://doi.org/10.1007/978-3-540-76929-3_5","url":null,"abstract":"","PeriodicalId":194921,"journal":{"name":"Asian Computing Science Conference","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133494760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols 加密协议中捕获重放攻击的形式化分析
Asian Computing Science Conference Pub Date : 2007-12-09 DOI: 10.1007/978-3-540-76929-3_15
Han Gao, C. Bodei, P. Degano, H. R. Nielson
{"title":"A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols","authors":"Han Gao, C. Bodei, P. Degano, H. R. Nielson","doi":"10.1007/978-3-540-76929-3_15","DOIUrl":"https://doi.org/10.1007/978-3-540-76929-3_15","url":null,"abstract":"","PeriodicalId":194921,"journal":{"name":"Asian Computing Science Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116051360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
On Run-Time Enforcement of Policies 关于策略的运行时执行
Asian Computing Science Conference Pub Date : 2007-12-09 DOI: 10.1007/978-3-540-76929-3_26
H. Shah, R. Shyamasundar
{"title":"On Run-Time Enforcement of Policies","authors":"H. Shah, R. Shyamasundar","doi":"10.1007/978-3-540-76929-3_26","DOIUrl":"https://doi.org/10.1007/978-3-540-76929-3_26","url":null,"abstract":"","PeriodicalId":194921,"journal":{"name":"Asian Computing Science Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116620058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信