Encyclopedia of Cryptography, Security and Privacy最新文献

筛选
英文 中文
Distributed Oblivious Transfer 分布式遗忘迁移
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1471-1
A. Beimel
{"title":"Distributed Oblivious Transfer","authors":"A. Beimel","doi":"10.1007/978-3-642-27739-9_1471-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1471-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122697348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial Machine Learning 对抗性机器学习
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1635-1
Nicolas Papernot
{"title":"Adversarial Machine Learning","authors":"Nicolas Papernot","doi":"10.1007/978-3-642-27739-9_1635-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1635-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128896574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric Recognition Errors 生物识别错误
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1656-1
Maria De Marsico
{"title":"Biometric Recognition Errors","authors":"Maria De Marsico","doi":"10.1007/978-3-642-27739-9_1656-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1656-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129046947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supervisory Control and Data Acquisition 监控和数据采集
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1201/b14667-11
SueAnne Griffith, Thomas H. Morris
{"title":"Supervisory Control and Data Acquisition","authors":"SueAnne Griffith, Thomas H. Morris","doi":"10.1201/b14667-11","DOIUrl":"https://doi.org/10.1201/b14667-11","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128517110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accountable and Traceable Attribute-Based Encryption 可问责和可追踪的基于属性的加密
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1456-1
Jianting Ning
{"title":"Accountable and Traceable Attribute-Based Encryption","authors":"Jianting Ning","doi":"10.1007/978-3-642-27739-9_1456-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1456-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130513491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location Semantics 位置语义
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1736-1
Isabell Wagner
{"title":"Location Semantics","authors":"Isabell Wagner","doi":"10.1007/978-3-642-27739-9_1736-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1736-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130749384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Aware Access Control Policies 隐私感知访问控制策略
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_827-2
S. De Capitani di Vimercati
{"title":"Privacy-Aware Access Control Policies","authors":"S. De Capitani di Vimercati","doi":"10.1007/978-3-642-27739-9_827-2","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_827-2","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131021807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometrics Security 生物识别技术的安全
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1603-1
Julian Fierrez, A. Morales, J. Ortega-Garcia
{"title":"Biometrics Security","authors":"Julian Fierrez, A. Morales, J. Ortega-Garcia","doi":"10.1007/978-3-642-27739-9_1603-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1603-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129477716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Attribute-Based Encryption with Offline Computation and Outsourced Decryption 基于属性的离线计算加密和外包解密
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1460-1
Junzuo Lai
{"title":"Attribute-Based Encryption with Offline Computation and Outsourced Decryption","authors":"Junzuo Lai","doi":"10.1007/978-3-642-27739-9_1460-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1460-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122121327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Periocular Biometrics 眼周的生物识别技术
Encyclopedia of Cryptography, Security and Privacy Pub Date : 1900-01-01 DOI: 10.1007/978-3-642-27739-9_1488-1
K. Raja, Raghavendra Ramachandra, C. Busch
{"title":"Periocular Biometrics","authors":"K. Raja, Raghavendra Ramachandra, C. Busch","doi":"10.1007/978-3-642-27739-9_1488-1","DOIUrl":"https://doi.org/10.1007/978-3-642-27739-9_1488-1","url":null,"abstract":"","PeriodicalId":335024,"journal":{"name":"Encyclopedia of Cryptography, Security and Privacy","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123450933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信