Encyclopedia of Cryptography, Security and Privacy最新文献

筛选
英文 中文
Pseudonyms for Mobile Networks 移动网络的假名
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1528-1
J. Petit
{"title":"Pseudonyms for Mobile Networks","authors":"J. Petit","doi":"10.1007/978-3-642-27739-9_1528-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1528-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129833300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Master Key 主密钥
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/0-387-23483-7_244
C. Adams
{"title":"Master Key","authors":"C. Adams","doi":"10.1007/0-387-23483-7_244","DOIUrl":"https://doi.org/10.1007/0-387-23483-7_244","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127412443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Governance in CPS CPS的管治
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1725-1
Polinpapilinho F. Katina
{"title":"Governance in CPS","authors":"Polinpapilinho F. Katina","doi":"10.1007/978-3-642-27739-9_1725-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1725-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130142133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric Spoofing and Its Evaluation 生物特征欺骗及其评估
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1657-1
Maria De Marsico
{"title":"Biometric Spoofing and Its Evaluation","authors":"Maria De Marsico","doi":"10.1007/978-3-642-27739-9_1657-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1657-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129167818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chaum Blind Signature Scheme Chaum盲签名方案
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/springerreference_160
Marta Bellés-Muñoz, Vanesa Daza
{"title":"Chaum Blind Signature Scheme","authors":"Marta Bellés-Muñoz, Vanesa Daza","doi":"10.1007/springerreference_160","DOIUrl":"https://doi.org/10.1007/springerreference_160","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"325 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127966291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECG Biometrics 心电生物识别技术
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1517-1
João Ribeiro Pinto, Jaime S. Cardoso
{"title":"ECG Biometrics","authors":"João Ribeiro Pinto, Jaime S. Cardoso","doi":"10.1007/978-3-642-27739-9_1517-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1517-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129285427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
k-Anonymity k-Anonymity
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_754-2
S. De Capitani di Vimercati, P. Samarati
{"title":"k-Anonymity","authors":"S. De Capitani di Vimercati, P. Samarati","doi":"10.1007/978-3-642-27739-9_754-2","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_754-2","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121418432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attribute-Based Encryption 基于属性的加密
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1454-1
Jianting Ning
{"title":"Attribute-Based Encryption","authors":"Jianting Ning","doi":"10.1007/978-3-642-27739-9_1454-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1454-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123078230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardware Obfuscation and Logic Locking 硬件混淆和逻辑锁定
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1646-1
Md. Moshiur Rahman, S. Bhunia
{"title":"Hardware Obfuscation and Logic Locking","authors":"Md. Moshiur Rahman, S. Bhunia","doi":"10.1007/978-3-642-27739-9_1646-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1646-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114063223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Economics of Personal Data 个人资料经济学
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1629-1
Aimilia Tasidou, P. Efraimidis
{"title":"Economics of Personal Data","authors":"Aimilia Tasidou, P. Efraimidis","doi":"10.1007/978-3-642-27739-9_1629-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1629-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121164469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信