Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering最新文献

筛选
英文 中文
Research on the Application of CI System in the Construction of University Class Culture Under the Internet Background 网络背景下CI系统在高校班级文化建设中的应用研究
Cheng-hui Zhang, Wei He, Yangbo Wu
{"title":"Research on the Application of CI System in the Construction of University Class Culture Under the Internet Background","authors":"Cheng-hui Zhang, Wei He, Yangbo Wu","doi":"10.1007/978-3-030-84386-1_40","DOIUrl":"https://doi.org/10.1007/978-3-030-84386-1_40","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121035272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parallel Implementation and Optimization of SM4 Based on CUDA 基于CUDA的SM4并行实现与优化
Jun Li, Wenbo Xie, Lingchen Li, Xiaonian Wu
{"title":"Parallel Implementation and Optimization of SM4 Based on CUDA","authors":"Jun Li, Wenbo Xie, Lingchen Li, Xiaonian Wu","doi":"10.1007/978-3-030-80851-8_7","DOIUrl":"https://doi.org/10.1007/978-3-030-80851-8_7","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130064661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards the Adaptability of Traffic-Based IoT Security Management Systems to the Device Behavior Evolutions 基于流量的物联网安全管理系统对设备行为演变的适应性研究
Chenxin Duan, Jia Li, Dongqi Han, Linna Fan, Shize Zhang, Jiahai Yang, Zhiliang Wang
{"title":"Towards the Adaptability of Traffic-Based IoT Security Management Systems to the Device Behavior Evolutions","authors":"Chenxin Duan, Jia Li, Dongqi Han, Linna Fan, Shize Zhang, Jiahai Yang, Zhiliang Wang","doi":"10.1007/978-3-030-80851-8_15","DOIUrl":"https://doi.org/10.1007/978-3-030-80851-8_15","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114887285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach for Code Smells Detection Based on Deep Leaning 基于深度学习的代码气味检测新方法
Tao Lin, Xue Fu, Fu Chen, Luqun Li
{"title":"A Novel Approach for Code Smells Detection Based on Deep Leaning","authors":"Tao Lin, Xue Fu, Fu Chen, Luqun Li","doi":"10.1007/978-3-030-80851-8_12","DOIUrl":"https://doi.org/10.1007/978-3-030-80851-8_12","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125028618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Anchor: An NDN-Based Blockchain Network 主播:一个基于ndn的区块链网络
Shucheng Yu, Noor O. Ahmed, Ruiran Wang
{"title":"Anchor: An NDN-Based Blockchain Network","authors":"Shucheng Yu, Noor O. Ahmed, Ruiran Wang","doi":"10.1007/978-3-030-80851-8_1","DOIUrl":"https://doi.org/10.1007/978-3-030-80851-8_1","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128079712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient and Private Divisible Double Auction in Trusted Execution Environment
Bingyu Liu, Shangyu Xie, Yuan Hong
{"title":"Efficient and Private Divisible Double Auction in Trusted Execution Environment","authors":"Bingyu Liu, Shangyu Xie, Yuan Hong","doi":"10.1007/978-3-030-80851-8_6","DOIUrl":"https://doi.org/10.1007/978-3-030-80851-8_6","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126090031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Security Enhanced Key Management Service for ARM Pointer Authentication 面向ARM指针认证的安全增强密钥管理服务
Liqiang Zhang, Qingsong Chen, Fei Yan
{"title":"A Security Enhanced Key Management Service for ARM Pointer Authentication","authors":"Liqiang Zhang, Qingsong Chen, Fei Yan","doi":"10.1007/978-3-030-80851-8_4","DOIUrl":"https://doi.org/10.1007/978-3-030-80851-8_4","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116870917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile Devices MobiWear:可穿戴移动设备的可信可否认加密系统
Niusen Chen, Bo Chen, Weisong Shi
{"title":"MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile Devices","authors":"Niusen Chen, Bo Chen, Weisong Shi","doi":"10.1007/978-3-030-80851-8_10","DOIUrl":"https://doi.org/10.1007/978-3-030-80851-8_10","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125565192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Identity-Based Blind Signature and Its Application for Privacy Preservation in Bitcoin 基于身份的盲签名及其在比特币隐私保护中的应用
Yitao Chen, Qi Feng, Min Luo, Li Li, D. He
{"title":"An Identity-Based Blind Signature and Its Application for Privacy Preservation in Bitcoin","authors":"Yitao Chen, Qi Feng, Min Luo, Li Li, D. He","doi":"10.1007/978-3-030-80851-8_2","DOIUrl":"https://doi.org/10.1007/978-3-030-80851-8_2","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"21 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114132313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Preserving ECC-Based Three-Factor Authentication Protocol for Smart Remote Vehicle Control System 基于隐私保护ecc的智能远程车辆控制系统三因素认证协议
Hongwei Luo, Qinyao Zhang, Guoai Xu
{"title":"Privacy-Preserving ECC-Based Three-Factor Authentication Protocol for Smart Remote Vehicle Control System","authors":"Hongwei Luo, Qinyao Zhang, Guoai Xu","doi":"10.1007/978-3-030-80851-8_5","DOIUrl":"https://doi.org/10.1007/978-3-030-80851-8_5","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127502458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信