Security and Privacy in Mobile Information and Communication Systems最新文献

筛选
英文 中文
The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs 基于gpu并行计算的WPA和WPA2密码分析
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2016-07-14 DOI: 10.1007/978-981-10-7850-7_11
Tien-Ho Chang, Chia-Mei Chen, H. Hsiao, Gu-Shin Lai
{"title":"The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs","authors":"Tien-Ho Chang, Chia-Mei Chen, H. Hsiao, Gu-Shin Lai","doi":"10.1007/978-981-10-7850-7_11","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_11","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133460703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Secure Color-Code Key Exchange Protocol for Mobile Chat Application 一个安全的彩色代码密钥交换协议的移动聊天应用程序
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2016-07-14 DOI: 10.1007/978-981-10-7850-7_6
Hsing-Chung Chen, Hong Chang, Tzu-Liang Kung, Yung-Fa Huang, Ze-Min Lin, Pei-Chi Yeh, Qiu-Hua Ruan
{"title":"A Secure Color-Code Key Exchange Protocol for Mobile Chat Application","authors":"Hsing-Chung Chen, Hong Chang, Tzu-Liang Kung, Yung-Fa Huang, Ze-Min Lin, Pei-Chi Yeh, Qiu-Hua Ruan","doi":"10.1007/978-981-10-7850-7_6","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_6","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124486048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Access Control for Cross-Border Transfer of Sensor Data 传感器数据跨界传输的访问控制
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2016-07-14 DOI: 10.1007/978-981-10-7850-7_13
Seira Hidano, S. Kiyomoto, A. Biswas, Toshihiro Uchibayashi, T. Suganuma
{"title":"Access Control for Cross-Border Transfer of Sensor Data","authors":"Seira Hidano, S. Kiyomoto, A. Biswas, Toshihiro Uchibayashi, T. Suganuma","doi":"10.1007/978-981-10-7850-7_13","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_13","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128950879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Implementation of SPEEX Speech Technology on ARM Processor SPEEX语音技术在ARM处理器上的设计与实现
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2016-07-14 DOI: 10.1007/978-981-10-7850-7_7
Chia-Chi Chang, Yen-Hao Shih
{"title":"Design and Implementation of SPEEX Speech Technology on ARM Processor","authors":"Chia-Chi Chang, Yen-Hao Shih","doi":"10.1007/978-981-10-7850-7_7","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_7","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128396191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Program Structure-Based Feature Selection for Android Malware Analysis 基于程序结构的Android恶意软件特征选择
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2012-06-25 DOI: 10.1007/978-3-642-33392-7_5
Andrew Walenstein, Luke Deshotels, Arun Lakhotia
{"title":"Program Structure-Based Feature Selection for Android Malware Analysis","authors":"Andrew Walenstein, Luke Deshotels, Arun Lakhotia","doi":"10.1007/978-3-642-33392-7_5","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_5","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"1998 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128234362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Scalable Trust Assessment and Remediation of Wireless Devices 无线设备的可扩展信任评估和修复
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2012-06-25 DOI: 10.1007/978-3-642-33392-7_7
Andreas Leicher, A. Schmidt, Yogendra Shah
{"title":"Scalable Trust Assessment and Remediation of Wireless Devices","authors":"Andreas Leicher, A. Schmidt, Yogendra Shah","doi":"10.1007/978-3-642-33392-7_7","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_7","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125053907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Presenting the Brazilian Project TSAM - Security Technologies for Mobile Environments 介绍巴西项目TSAM -移动环境的安全技术
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2012-06-25 DOI: 10.1007/978-3-642-33392-7_6
A. Braga, Erick N. Nascimento, Lucas R. Palma
{"title":"Presenting the Brazilian Project TSAM - Security Technologies for Mobile Environments","authors":"A. Braga, Erick N. Nascimento, Lucas R. Palma","doi":"10.1007/978-3-642-33392-7_6","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_6","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123559450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Verifying the Location of a Mobile Device User 验证移动设备用户的位置
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2012-06-25 DOI: 10.1007/978-3-642-33392-7_8
Jack Brassil, P. Manadhata
{"title":"Verifying the Location of a Mobile Device User","authors":"Jack Brassil, P. Manadhata","doi":"10.1007/978-3-642-33392-7_8","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_8","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122084149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile Smart Card Reader Using NFC-Enabled Smartphones 使用nfc功能的智能手机的移动智能卡读卡器
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2012-06-25 DOI: 10.1007/978-3-642-33392-7_3
F. Morgner, Dominik Oepen, Wolf Müller, J. Redlich
{"title":"Mobile Smart Card Reader Using NFC-Enabled Smartphones","authors":"F. Morgner, Dominik Oepen, Wolf Müller, J. Redlich","doi":"10.1007/978-3-642-33392-7_3","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_3","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128832319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Securing Mobile Device-Based Machine Interactions with User Location Histories 保护基于移动设备的机器与用户位置历史的交互
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2012-06-25 DOI: 10.1007/978-3-642-33392-7_10
Philipp Marcus, Moritz Kessel, Claudia Linnhoff-Popien
{"title":"Securing Mobile Device-Based Machine Interactions with User Location Histories","authors":"Philipp Marcus, Moritz Kessel, Claudia Linnhoff-Popien","doi":"10.1007/978-3-642-33392-7_10","DOIUrl":"https://doi.org/10.1007/978-3-642-33392-7_10","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123571489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信