Conference on Network Security & Applications最新文献

筛选
英文 中文
Security for High-Speed MANs/WANs 高速城域网/广域网的安全性
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_8
C. S. Lamba
{"title":"Security for High-Speed MANs/WANs","authors":"C. S. Lamba","doi":"10.1007/978-3-642-14478-3_8","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_8","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128677782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach for Compressed Video Steganography 压缩视频隐写的一种新方法
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_57
A. Sherly, S. Sasidharan, A. S. Raj, P. Amritha
{"title":"A Novel Approach for Compressed Video Steganography","authors":"A. Sherly, S. Sasidharan, A. S. Raj, P. Amritha","doi":"10.1007/978-3-642-14478-3_57","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_57","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130698309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing 云计算中确保全面数据删除的可擦除性证明
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_35
Mithun Paul, A. Saxena
{"title":"Proof Of Erasability for Ensuring Comprehensive Data Deletion in Cloud Computing","authors":"Mithun Paul, A. Saxena","doi":"10.1007/978-3-642-14478-3_35","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_35","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126267493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Analysis and Comparative Study of Different Backoff Algorithms with Probability Based Backoff Algorithm 基于概率退避算法的不同退避算法分析与比较研究
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_34
Narendran Rajagopalan, C. Mala
{"title":"Analysis and Comparative Study of Different Backoff Algorithms with Probability Based Backoff Algorithm","authors":"Narendran Rajagopalan, C. Mala","doi":"10.1007/978-3-642-14478-3_34","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_34","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126436016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Reputation Enhancement in a Trust Management System 在信任管理系统中提升声誉
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_44
Shashi Bhanwar, S. Bawa
{"title":"Reputation Enhancement in a Trust Management System","authors":"Shashi Bhanwar, S. Bawa","doi":"10.1007/978-3-642-14478-3_44","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_44","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133649529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy Preserving Mining of Distributed Data Using Steganography 使用隐写术的分布式数据隐私保护挖掘
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_27
D. Kumari, K. R. Rao, M. Suman
{"title":"Privacy Preserving Mining of Distributed Data Using Steganography","authors":"D. Kumari, K. R. Rao, M. Suman","doi":"10.1007/978-3-642-14478-3_27","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_27","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132068146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Address Allocation Algorithm for IPv6 IPv6的混合地址分配算法
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_51
R. Murugesan, S. Ramadass
{"title":"A Hybrid Address Allocation Algorithm for IPv6","authors":"R. Murugesan, S. Ramadass","doi":"10.1007/978-3-642-14478-3_51","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_51","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125044668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Implementation of Pessimistic Commit Protocols in Mobile Environments 移动环境下悲观提交协议的设计与实现
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_61
S. A. Moiz, L. Rajamani, Supriya N. Pal
{"title":"Design and Implementation of Pessimistic Commit Protocols in Mobile Environments","authors":"S. A. Moiz, L. Rajamani, Supriya N. Pal","doi":"10.1007/978-3-642-14478-3_61","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_61","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121168030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
BubbleTrust: A Reliable Trust Management for Large P2P Networks 大型P2P网络的可靠信任管理
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_37
M. Novotný, F. Zavoral
{"title":"BubbleTrust: A Reliable Trust Management for Large P2P Networks","authors":"M. Novotný, F. Zavoral","doi":"10.1007/978-3-642-14478-3_37","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_37","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"62 18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122507174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks 移动自组织网络的分布式信任和声誉框架
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_54
Jaydip Sen
{"title":"A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks","authors":"Jaydip Sen","doi":"10.1007/978-3-642-14478-3_54","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_54","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129994731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信