Conference on Network Security & Applications最新文献

筛选
英文 中文
A Framework for Mining Strong Positive and Negative Association Rules of Frequent Objects in Spatial Database System Using Interesting Measure 基于兴趣度量的空间数据库系统频繁对象强正、负关联规则挖掘框架
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_59
A. Tripathy, Subhalaxmi Das, P. Patra
{"title":"A Framework for Mining Strong Positive and Negative Association Rules of Frequent Objects in Spatial Database System Using Interesting Measure","authors":"A. Tripathy, Subhalaxmi Das, P. Patra","doi":"10.1007/978-3-642-14478-3_59","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_59","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122747534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks 基于可靠性的无线移动自组网源路由协议设计
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_46
N. Meghanathan
{"title":"Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad Hoc Networks","authors":"N. Meghanathan","doi":"10.1007/978-3-642-14478-3_46","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_46","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116212046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges 面向物联网(IoT)的身份管理框架:路线图和关键挑战
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_43
P. Mahalle, S. Babar, N. Prasad, R. Prasad
{"title":"Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges","authors":"P. Mahalle, S. Babar, N. Prasad, R. Prasad","doi":"10.1007/978-3-642-14478-3_43","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_43","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115385542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 109
Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) 物联网(IoT)安全模型和威胁分类建议
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_42
S. Babar, P. Mahalle, Antonietta Stango, N. Prasad, R. Prasad
{"title":"Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)","authors":"S. Babar, P. Mahalle, Antonietta Stango, N. Prasad, R. Prasad","doi":"10.1007/978-3-642-14478-3_42","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_42","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121680646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 283
Trust Management Framework for Ubiquitous Applications 泛在应用的信任管理框架
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_50
N. Raghu, M. Chaithanya, P. Lakshmi, G. Jyostna, B. Manjulatha, N. Sarat
{"title":"Trust Management Framework for Ubiquitous Applications","authors":"N. Raghu, M. Chaithanya, P. Lakshmi, G. Jyostna, B. Manjulatha, N. Sarat","doi":"10.1007/978-3-642-14478-3_50","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_50","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131541355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Privacy Preserving Data Mining by Cyptography 基于密码学的隐私保护数据挖掘
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_58
Anand Sharma, Vibha Ojha
{"title":"Privacy Preserving Data Mining by Cyptography","authors":"Anand Sharma, Vibha Ojha","doi":"10.1007/978-3-642-14478-3_58","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_58","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"338 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132906618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols MANETs路由协议中高效动态概率广播算法的建模与性能分析
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_52
D. Dembla, Y. Chaba
{"title":"Modeling and Performance Analysis of Efficient and Dynamic Probabilistic Broadcasting Algorithm in MANETs Routing Protocols","authors":"D. Dembla, Y. Chaba","doi":"10.1007/978-3-642-14478-3_52","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_52","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114684917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Encryption of Intra and Inter Frames in MPEG Video MPEG视频帧内帧间的有效加密
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_10
V. Vijayalakshmi, L. M. Varalakshmi, G. Sudha
{"title":"Efficient Encryption of Intra and Inter Frames in MPEG Video","authors":"V. Vijayalakshmi, L. M. Varalakshmi, G. Sudha","doi":"10.1007/978-3-642-14478-3_10","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_10","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133380672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Concurrent Usage Control Implementation Verification Using the SPIN Model Checker 使用SPIN模型检查器验证并发使用控制实现
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_22
P. Rajkumar, S. Ghosh, P. Dasgupta
{"title":"Concurrent Usage Control Implementation Verification Using the SPIN Model Checker","authors":"P. Rajkumar, S. Ghosh, P. Dasgupta","doi":"10.1007/978-3-642-14478-3_22","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_22","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116102045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET 通过串通行为不端的MANET节点检测和缓解攻击
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_19
Poonam Gera, K. Garg, M. Misra
{"title":"Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET","authors":"Poonam Gera, K. Garg, M. Misra","doi":"10.1007/978-3-642-14478-3_19","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_19","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125207787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信