Conference on Network Security & Applications最新文献

筛选
英文 中文
Global Search Analysis of Spatial Gene Expression Data Using Genetic Algorithm 基于遗传算法的空间基因表达数据全局搜索分析
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_60
M. Anandhavalli, M. Ghose, K. Gauthaman, M. Boosha
{"title":"Global Search Analysis of Spatial Gene Expression Data Using Genetic Algorithm","authors":"M. Anandhavalli, M. Ghose, K. Gauthaman, M. Boosha","doi":"10.1007/978-3-642-14478-3_60","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_60","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127885222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy Preserving Ciphertext Policy Attribute Based Encryption 保护隐私的密文策略属性加密
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_40
A. Balu, K. Krishnamoorthy
{"title":"Privacy Preserving Ciphertext Policy Attribute Based Encryption","authors":"A. Balu, K. Krishnamoorthy","doi":"10.1007/978-3-642-14478-3_40","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_40","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115262874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model 基于SAT的STRBAC模型支持无线局域网安全策略管理验证框架
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_24
P. Bera, Soumyadev Maity, S. Ghosh, P. Dasgupta
{"title":"A SAT Based Verification Framework for Wireless LAN Security Policy Management Supported by STRBAC Model","authors":"P. Bera, Soumyadev Maity, S. Ghosh, P. Dasgupta","doi":"10.1007/978-3-642-14478-3_24","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_24","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128382555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Layer for Business Intelligence 商业智能的隐私层
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_33
Vishal Gupta, A. Saxena
{"title":"Privacy Layer for Business Intelligence","authors":"Vishal Gupta, A. Saxena","doi":"10.1007/978-3-642-14478-3_33","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_33","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122622205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for Mobile Adhoc Networks 移动自组网变比特率场景下组播路由协议性能比较
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_12
N. Bhalaji, P. Gurunathan, A. Shanmugam
{"title":"Performance Comparison of Multicast Routing Protocols under Variable Bit Rate Scenario for Mobile Adhoc Networks","authors":"N. Bhalaji, P. Gurunathan, A. Shanmugam","doi":"10.1007/978-3-642-14478-3_12","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_12","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129935400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification 安全协议验证的形式化模型检验工具比较分析
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_16
Reema Patel, Bhavesh Borisaniya, Avi Patel, D. Patel, M. Rajarajan, A. Zisman
{"title":"Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification","authors":"Reema Patel, Bhavesh Borisaniya, Avi Patel, D. Patel, M. Rajarajan, A. Zisman","doi":"10.1007/978-3-642-14478-3_16","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_16","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130029405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Secured Paradigm for Mobile Databases 移动数据库的安全范式
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_17
D. Selvarani
{"title":"Secured Paradigm for Mobile Databases","authors":"D. Selvarani","doi":"10.1007/978-3-642-14478-3_17","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_17","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"16 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120926946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Load Balancing in Distributed Web Caching 分布式Web缓存中的负载均衡
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_5
R. Tiwari, Gulista Khan
{"title":"Load Balancing in Distributed Web Caching","authors":"R. Tiwari, Gulista Khan","doi":"10.1007/978-3-642-14478-3_5","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_5","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116435281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Clustering Approach in Speech Phoneme Recognition Based on Statistical Analysis 基于统计分析的语音音位识别聚类方法
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_48
G. Tak, V. Bhargava
{"title":"Clustering Approach in Speech Phoneme Recognition Based on Statistical Analysis","authors":"G. Tak, V. Bhargava","doi":"10.1007/978-3-642-14478-3_48","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_48","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123756058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies 基于最先进的IdM分类法的身份管理解决方案的比较路线图
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_36
Madhan Kumar Srinivasan, P. Rodrigues
{"title":"A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies","authors":"Madhan Kumar Srinivasan, P. Rodrigues","doi":"10.1007/978-3-642-14478-3_36","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_36","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126826721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信