Proceedings of the 10th ACM conference on Computer and communications security最新文献

筛选
英文 中文
Session details: Access control 会话详细信息:访问控制
Gail-Joon Ahn
{"title":"Session details: Access control","authors":"Gail-Joon Ahn","doi":"10.1145/3247650","DOIUrl":"https://doi.org/10.1145/3247650","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134217190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Cryptographic protocols/ network security 会话详细信息:加密协议/网络安全
Avi Rubin
{"title":"Session details: Cryptographic protocols/ network security","authors":"Avi Rubin","doi":"10.1145/3247654","DOIUrl":"https://doi.org/10.1145/3247654","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127848921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Privacy/anonymity 会话详细信息:隐私/匿名
S. Stubblebine
{"title":"Session details: Privacy/anonymity","authors":"S. Stubblebine","doi":"10.1145/3247651","DOIUrl":"https://doi.org/10.1145/3247651","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"165 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114829331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Emerging applications 会话详细信息:新兴应用程序
P. Ning
{"title":"Session details: Emerging applications","authors":"P. Ning","doi":"10.1145/3247656","DOIUrl":"https://doi.org/10.1145/3247656","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116604248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Keynote 会议详情:
S. Jajodia
{"title":"Session details: Keynote","authors":"S. Jajodia","doi":"10.1145/3247647","DOIUrl":"https://doi.org/10.1145/3247647","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127619936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Intrusion detection 会话详细信息:入侵检测
Peng Liu
{"title":"Session details: Intrusion detection","authors":"Peng Liu","doi":"10.1145/3247655","DOIUrl":"https://doi.org/10.1145/3247655","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114381960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Analysis and verification 会话详细信息:分析和验证
Shiuhpyng W. Shieh
{"title":"Session details: Analysis and verification","authors":"Shiuhpyng W. Shieh","doi":"10.1145/3247657","DOIUrl":"https://doi.org/10.1145/3247657","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133751229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Information warfare 会议细节:信息战
Joon Park
{"title":"Session details: Information warfare","authors":"Joon Park","doi":"10.1145/3247653","DOIUrl":"https://doi.org/10.1145/3247653","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124071436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Authentication and signature schemes 会话详细信息:认证和签名方案
P. Syverson
{"title":"Session details: Authentication and signature schemes","authors":"P. Syverson","doi":"10.1145/3247652","DOIUrl":"https://doi.org/10.1145/3247652","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"180 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114058922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Sensor networks 会话详细信息:传感器网络
Virgil Gilgor
{"title":"Session details: Sensor networks","authors":"Virgil Gilgor","doi":"10.1145/3247649","DOIUrl":"https://doi.org/10.1145/3247649","url":null,"abstract":"","PeriodicalId":340767,"journal":{"name":"Proceedings of the 10th ACM conference on Computer and communications security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128979443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信