{"title":"Research on the Application of CI System in the Construction of University Class Culture Under the Internet Background","authors":"Cheng-hui Zhang, Wei He, Yangbo Wu","doi":"10.1007/978-3-030-84386-1_40","DOIUrl":"https://doi.org/10.1007/978-3-030-84386-1_40","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121035272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallel Implementation and Optimization of SM4 Based on CUDA","authors":"Jun Li, Wenbo Xie, Lingchen Li, Xiaonian Wu","doi":"10.1007/978-3-030-80851-8_7","DOIUrl":"https://doi.org/10.1007/978-3-030-80851-8_7","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130064661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chenxin Duan, Jia Li, Dongqi Han, Linna Fan, Shize Zhang, Jiahai Yang, Zhiliang Wang
{"title":"Towards the Adaptability of Traffic-Based IoT Security Management Systems to the Device Behavior Evolutions","authors":"Chenxin Duan, Jia Li, Dongqi Han, Linna Fan, Shize Zhang, Jiahai Yang, Zhiliang Wang","doi":"10.1007/978-3-030-80851-8_15","DOIUrl":"https://doi.org/10.1007/978-3-030-80851-8_15","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114887285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach for Code Smells Detection Based on Deep Leaning","authors":"Tao Lin, Xue Fu, Fu Chen, Luqun Li","doi":"10.1007/978-3-030-80851-8_12","DOIUrl":"https://doi.org/10.1007/978-3-030-80851-8_12","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125028618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anchor: An NDN-Based Blockchain Network","authors":"Shucheng Yu, Noor O. Ahmed, Ruiran Wang","doi":"10.1007/978-3-030-80851-8_1","DOIUrl":"https://doi.org/10.1007/978-3-030-80851-8_1","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128079712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient and Private Divisible Double Auction in Trusted Execution Environment","authors":"Bingyu Liu, Shangyu Xie, Yuan Hong","doi":"10.1007/978-3-030-80851-8_6","DOIUrl":"https://doi.org/10.1007/978-3-030-80851-8_6","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126090031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Security Enhanced Key Management Service for ARM Pointer Authentication","authors":"Liqiang Zhang, Qingsong Chen, Fei Yan","doi":"10.1007/978-3-030-80851-8_4","DOIUrl":"https://doi.org/10.1007/978-3-030-80851-8_4","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116870917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile Devices","authors":"Niusen Chen, Bo Chen, Weisong Shi","doi":"10.1007/978-3-030-80851-8_10","DOIUrl":"https://doi.org/10.1007/978-3-030-80851-8_10","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125565192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Identity-Based Blind Signature and Its Application for Privacy Preservation in Bitcoin","authors":"Yitao Chen, Qi Feng, Min Luo, Li Li, D. He","doi":"10.1007/978-3-030-80851-8_2","DOIUrl":"https://doi.org/10.1007/978-3-030-80851-8_2","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"21 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114132313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-Preserving ECC-Based Three-Factor Authentication Protocol for Smart Remote Vehicle Control System","authors":"Hongwei Luo, Qinyao Zhang, Guoai Xu","doi":"10.1007/978-3-030-80851-8_5","DOIUrl":"https://doi.org/10.1007/978-3-030-80851-8_5","url":null,"abstract":"","PeriodicalId":335916,"journal":{"name":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127502458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}