Security and Privacy in Mobile Information and Communication Systems最新文献

筛选
英文 中文
An Automated Graph Based Approach to Risk Assessment for Computer Networks with Mobile Components 基于自动图的移动组件计算机网络风险评估方法
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2016-07-14 DOI: 10.1007/978-981-10-7850-7_9
E. Doynikova, Igor Kotenko
{"title":"An Automated Graph Based Approach to Risk Assessment for Computer Networks with Mobile Components","authors":"E. Doynikova, Igor Kotenko","doi":"10.1007/978-981-10-7850-7_9","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_9","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"35 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123522922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Hybrid Architecture for High Speed Regular Expression Matching 一种用于高速正则表达式匹配的新型混合架构
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2016-07-14 DOI: 10.1007/978-981-10-7850-7_15
Chengcheng Xu, Bao-kang Zhao, Shuhui Chen, Jinshu Su
{"title":"A Novel Hybrid Architecture for High Speed Regular Expression Matching","authors":"Chengcheng Xu, Bao-kang Zhao, Shuhui Chen, Jinshu Su","doi":"10.1007/978-981-10-7850-7_15","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_15","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"146 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133621122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Policy Management System Based on Multi-dimensional Attribution Label 基于多维属性标签的策略管理系统
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2016-07-14 DOI: 10.1007/978-981-10-7850-7_12
Bo Liu, Jianfeng Guan, Zhongbai Jiang
{"title":"A Policy Management System Based on Multi-dimensional Attribution Label","authors":"Bo Liu, Jianfeng Guan, Zhongbai Jiang","doi":"10.1007/978-981-10-7850-7_12","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_12","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116917671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment of Computer Network Resilience Under Impact of Cyber Attacks on the Basis of Stochastic Networks Conversion 基于随机网络转换的网络攻击影响下计算机网络弹性评估
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2016-07-14 DOI: 10.1007/978-981-10-7850-7_10
Igor Kotenko, I. Saenko, O. Lauta, Mikhail Kocinyak
{"title":"Assessment of Computer Network Resilience Under Impact of Cyber Attacks on the Basis of Stochastic Networks Conversion","authors":"Igor Kotenko, I. Saenko, O. Lauta, Mikhail Kocinyak","doi":"10.1007/978-981-10-7850-7_10","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_10","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134369322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Personal Identification Using Time and Frequency Domain Features of ECG Lead-I 基于心电导联时频域特征的身份识别
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2016-07-14 DOI: 10.1007/978-981-10-7850-7_5
Gyu-Ho Choi, H. Moon, S. Pan
{"title":"Personal Identification Using Time and Frequency Domain Features of ECG Lead-I","authors":"Gyu-Ho Choi, H. Moon, S. Pan","doi":"10.1007/978-981-10-7850-7_5","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_5","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"435 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122485461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Discrete Wavelet Transformation Based Fast and Secure Transmission of Images for Group Communication 基于离散小波变换的群体通信图像快速安全传输
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2016-07-14 DOI: 10.1007/978-981-10-7850-7_8
M. Sridevi, C. Mala, S. Prabha
{"title":"A Discrete Wavelet Transformation Based Fast and Secure Transmission of Images for Group Communication","authors":"M. Sridevi, C. Mala, S. Prabha","doi":"10.1007/978-981-10-7850-7_8","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_8","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114982394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs 基于gpu并行计算的WPA和WPA2密码分析
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2016-07-14 DOI: 10.1007/978-981-10-7850-7_11
Tien-Ho Chang, Chia-Mei Chen, H. Hsiao, Gu-Shin Lai
{"title":"The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing with GPUs","authors":"Tien-Ho Chang, Chia-Mei Chen, H. Hsiao, Gu-Shin Lai","doi":"10.1007/978-981-10-7850-7_11","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_11","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133460703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Secure Color-Code Key Exchange Protocol for Mobile Chat Application 一个安全的彩色代码密钥交换协议的移动聊天应用程序
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2016-07-14 DOI: 10.1007/978-981-10-7850-7_6
Hsing-Chung Chen, Hong Chang, Tzu-Liang Kung, Yung-Fa Huang, Ze-Min Lin, Pei-Chi Yeh, Qiu-Hua Ruan
{"title":"A Secure Color-Code Key Exchange Protocol for Mobile Chat Application","authors":"Hsing-Chung Chen, Hong Chang, Tzu-Liang Kung, Yung-Fa Huang, Ze-Min Lin, Pei-Chi Yeh, Qiu-Hua Ruan","doi":"10.1007/978-981-10-7850-7_6","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_6","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124486048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Access Control for Cross-Border Transfer of Sensor Data 传感器数据跨界传输的访问控制
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2016-07-14 DOI: 10.1007/978-981-10-7850-7_13
Seira Hidano, S. Kiyomoto, A. Biswas, Toshihiro Uchibayashi, T. Suganuma
{"title":"Access Control for Cross-Border Transfer of Sensor Data","authors":"Seira Hidano, S. Kiyomoto, A. Biswas, Toshihiro Uchibayashi, T. Suganuma","doi":"10.1007/978-981-10-7850-7_13","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_13","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128950879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Implementation of SPEEX Speech Technology on ARM Processor SPEEX语音技术在ARM处理器上的设计与实现
Security and Privacy in Mobile Information and Communication Systems Pub Date : 2016-07-14 DOI: 10.1007/978-981-10-7850-7_7
Chia-Chi Chang, Yen-Hao Shih
{"title":"Design and Implementation of SPEEX Speech Technology on ARM Processor","authors":"Chia-Chi Chang, Yen-Hao Shih","doi":"10.1007/978-981-10-7850-7_7","DOIUrl":"https://doi.org/10.1007/978-981-10-7850-7_7","url":null,"abstract":"","PeriodicalId":270570,"journal":{"name":"Security and Privacy in Mobile Information and Communication Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128396191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信