International Standard Conference of Trustworthy Computing and Services最新文献

筛选
英文 中文
MD5 Calculation and Decryption Using CUDA on GPU 基于GPU CUDA的MD5计算与解密
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_3
Yanjun Jiang, Mingshan Lei
{"title":"MD5 Calculation and Decryption Using CUDA on GPU","authors":"Yanjun Jiang, Mingshan Lei","doi":"10.1007/978-3-662-43908-1_3","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_3","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132473908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective Rate Control Algorithm for H.264 Based on Scene Change Detection 基于场景变化检测的H.264有效速率控制算法
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_12
Yaoyao Guo, Songlin Sun, Xiaojun Jing, Hai Huang, Yueming Lu, Na Chen
{"title":"Effective Rate Control Algorithm for H.264 Based on Scene Change Detection","authors":"Yaoyao Guo, Songlin Sun, Xiaojun Jing, Hai Huang, Yueming Lu, Na Chen","doi":"10.1007/978-3-662-43908-1_12","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_12","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"26 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132972986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Another Improvement of LMAP++: An RFID Authentication Protocol lmap++的另一个改进:RFID认证协议
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_13
Anqi Huang, Chen Zhang, Chaojing Tang
{"title":"Another Improvement of LMAP++: An RFID Authentication Protocol","authors":"Anqi Huang, Chen Zhang, Chaojing Tang","doi":"10.1007/978-3-662-43908-1_13","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_13","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130469182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trustworthiness in the Patient Centred Health Care System 以病人为中心的医疗保健系统的可信度
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_44
E. Liu, Xiaohua Feng
{"title":"Trustworthiness in the Patient Centred Health Care System","authors":"E. Liu, Xiaohua Feng","doi":"10.1007/978-3-662-43908-1_44","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_44","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116252662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Research on Efficient Dynamic Cloud Storage Ciphertext Access Control 高效动态云存储密文访问控制研究
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_38
N. Song, Z. Mei, Lin Yao
{"title":"Research on Efficient Dynamic Cloud Storage Ciphertext Access Control","authors":"N. Song, Z. Mei, Lin Yao","doi":"10.1007/978-3-662-43908-1_38","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_38","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"43 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114122229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Testing Approaches - For Research, Industry and Standardization 安全测试方法-用于研究,工业和标准化
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_49
A. Rennoch, I. Schieferdecker, J. Großmann
{"title":"Security Testing Approaches - For Research, Industry and Standardization","authors":"A. Rennoch, I. Schieferdecker, J. Großmann","doi":"10.1007/978-3-662-43908-1_49","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_49","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134119805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Common Vulnerability Scoring System Based on K-means 一种改进的基于k均值的通用漏洞评分系统
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_8
Pingping Liu, Zhihong Tian, Xu Wu, W. Liu
{"title":"An Improved Common Vulnerability Scoring System Based on K-means","authors":"Pingping Liu, Zhihong Tian, Xu Wu, W. Liu","doi":"10.1007/978-3-662-43908-1_8","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_8","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115808899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Mobile Botnet Model Based on Android System 基于Android系统的移动僵尸网络模型
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_7
Peng Wang, Chengwei Zhang, Xuan Li, C. Zhang
{"title":"A Mobile Botnet Model Based on Android System","authors":"Peng Wang, Chengwei Zhang, Xuan Li, C. Zhang","doi":"10.1007/978-3-662-43908-1_7","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_7","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122555857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Business Impact Analysis Model Based on the Analytic Hierarchy Process 基于层次分析法的业务影响分析模型
International Standard Conference of Trustworthy Computing and Services Pub Date : 2013-11-29 DOI: 10.1007/978-3-662-43908-1_30
Ji-zheng Guan, Xiaolu Zhu, Mingtao Lei, Jianyi Liu, Cong Wang
{"title":"Business Impact Analysis Model Based on the Analytic Hierarchy Process","authors":"Ji-zheng Guan, Xiaolu Zhu, Mingtao Lei, Jianyi Liu, Cong Wang","doi":"10.1007/978-3-662-43908-1_30","DOIUrl":"https://doi.org/10.1007/978-3-662-43908-1_30","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121505007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Method Based on Fuzzy C-Means Algorithm for Search Results Clustering 一种基于模糊c均值算法的搜索结果聚类新方法
International Standard Conference of Trustworthy Computing and Services Pub Date : 2012-05-28 DOI: 10.1007/978-3-642-35795-4_33
Fei Wang, Yueming Lu, Fangwei Zhang, Songlin Sun
{"title":"A New Method Based on Fuzzy C-Means Algorithm for Search Results Clustering","authors":"Fei Wang, Yueming Lu, Fangwei Zhang, Songlin Sun","doi":"10.1007/978-3-642-35795-4_33","DOIUrl":"https://doi.org/10.1007/978-3-642-35795-4_33","url":null,"abstract":"","PeriodicalId":393908,"journal":{"name":"International Standard Conference of Trustworthy Computing and Services","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116866438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信