Conference on Network Security & Applications最新文献

筛选
英文 中文
Reliable Timeout Based Commit Protocol 基于可靠超时的提交协议
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_41
Bharati Harsoor, S. Ramachandram
{"title":"Reliable Timeout Based Commit Protocol","authors":"Bharati Harsoor, S. Ramachandram","doi":"10.1007/978-3-642-14478-3_41","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_41","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132897532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Knowledge Base Compound Approach towards Spam Detection 面向垃圾邮件检测的知识库复合方法
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_49
G. Tak, S. Tapaswi
{"title":"Knowledge Base Compound Approach towards Spam Detection","authors":"G. Tak, S. Tapaswi","doi":"10.1007/978-3-642-14478-3_49","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_49","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133926489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Trust Models in Wireless Sensor Networks: A Survey 无线传感器网络中的信任模型研究
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_4
Mohammad Momani
{"title":"Trust Models in Wireless Sensor Networks: A Survey","authors":"Mohammad Momani","doi":"10.1007/978-3-642-14478-3_4","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_4","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127843119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network 点对点无线网状网络中自私丢包节点基于信任的检测算法
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_53
Jaydip Sen
{"title":"A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network","authors":"Jaydip Sen","doi":"10.1007/978-3-642-14478-3_53","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_53","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114853808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Security for Contactless Smart Cards Using Cryptography 使用密码的非接触式智能卡的安全性
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_56
Anuj Kundarap, Arpit Chhajlani, Rashu Singla, Mugdha Sawant, Milind Dere, P. Mahalle
{"title":"Security for Contactless Smart Cards Using Cryptography","authors":"Anuj Kundarap, Arpit Chhajlani, Rashu Singla, Mugdha Sawant, Milind Dere, P. Mahalle","doi":"10.1007/978-3-642-14478-3_56","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_56","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116424002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks A- code:一种保护无线传感器网络安全的新密码原语
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_45
G. Schmid, F. Rossi
{"title":"A-Code: A New Crypto Primitive for Securing Wireless Sensor Networks","authors":"G. Schmid, F. Rossi","doi":"10.1007/978-3-642-14478-3_45","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_45","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121908963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc Networks 移动自组网中点对点信息共享的高效基于区域的密钥协议
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_29
Krishnan Kumar, J. Begum, V. Sumathy
{"title":"Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc Networks","authors":"Krishnan Kumar, J. Begum, V. Sumathy","doi":"10.1007/978-3-642-14478-3_29","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_29","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123495898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks 以数据为中心的异构无线传感器网络安全框架
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_1
M. Sandhya, K. Murugan
{"title":"Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks","authors":"M. Sandhya, K. Murugan","doi":"10.1007/978-3-642-14478-3_1","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_1","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121350163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementation of MPEG-7 Document Management System Based on Native Database 基于本地数据库的MPEG-7文档管理系统的实现
Conference on Network Security & Applications Pub Date : 2010-07-23 DOI: 10.1007/978-3-642-14478-3_63
Byeong-Tae Ahn
{"title":"Implementation of MPEG-7 Document Management System Based on Native Database","authors":"Byeong-Tae Ahn","doi":"10.1007/978-3-642-14478-3_63","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_63","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122271924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Security in Local Area Network Based on Fast Encryption Algorithm
Conference on Network Security & Applications Pub Date : 2010-06-01 DOI: 10.1007/978-3-642-14478-3_2
G. Ramesh, R. Umarani
{"title":"Data Security in Local Area Network Based on Fast Encryption Algorithm","authors":"G. Ramesh, R. Umarani","doi":"10.1007/978-3-642-14478-3_2","DOIUrl":"https://doi.org/10.1007/978-3-642-14478-3_2","url":null,"abstract":"","PeriodicalId":364694,"journal":{"name":"Conference on Network Security & Applications","volume":"265 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122533254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信