International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage最新文献

筛选
英文 中文
Cloud Enabled e-Glossary System: A Smart Campus Perspective 云支持的电子词汇系统:一个智能校园的视角
Musaddiq Majid Khan Al-Nadwi, Nadia Refat, Nafees Zaman, M. A. Rahman, Md. Zakirul Alam Bhuiyan, R. Razali
{"title":"Cloud Enabled e-Glossary System: A Smart Campus Perspective","authors":"Musaddiq Majid Khan Al-Nadwi, Nadia Refat, Nafees Zaman, M. A. Rahman, Md. Zakirul Alam Bhuiyan, R. Razali","doi":"10.1007/978-3-030-05345-1_21","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_21","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129249371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Privacy-Preserving Attribute-Based Access Control Scheme 一种基于隐私保护属性的访问控制方案
Yang Xu, Quanrun Zeng, Guojun Wang, Cheng Zhang, Ju Ren, Yaoxue Zhang
{"title":"A Privacy-Preserving Attribute-Based Access Control Scheme","authors":"Yang Xu, Quanrun Zeng, Guojun Wang, Cheng Zhang, Ju Ren, Yaoxue Zhang","doi":"10.1007/978-3-030-05345-1_31","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_31","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131479906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Research on Multi-focus Image Fusion Algorithm Based on Quadtree 基于四叉树的多焦点图像融合算法研究
Senlin Wang, Junhai Zhou, Qin Liu, Zheng Qin, Panlin Hou
{"title":"Research on Multi-focus Image Fusion Algorithm Based on Quadtree","authors":"Senlin Wang, Junhai Zhou, Qin Liu, Zheng Qin, Panlin Hou","doi":"10.1007/978-3-030-05345-1_39","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_39","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133361783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Provable Multi-copy Data Possession Scheme with Data Dynamics 基于数据动态的高效可证明多副本数据占有方案
Zuojie Deng, Shuhong Chen, Xiaolan Tan, Dan Song, Fan Wu
{"title":"An Efficient Provable Multi-copy Data Possession Scheme with Data Dynamics","authors":"Zuojie Deng, Shuhong Chen, Xiaolan Tan, Dan Song, Fan Wu","doi":"10.1007/978-3-030-05345-1_34","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_34","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115413802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
NTRDM: A New Bus Line Network Optimization Method Based on Taxi Passenger Flow Conversion 基于出租车客流转换的公交线网优化新方法NTRDM
Bo Huang, Guixi Xiong, Zhipu Xie, S. Huang, Bowen Du
{"title":"NTRDM: A New Bus Line Network Optimization Method Based on Taxi Passenger Flow Conversion","authors":"Bo Huang, Guixi Xiong, Zhipu Xie, S. Huang, Bowen Du","doi":"10.1007/978-3-030-05345-1_29","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_29","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"408 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123558975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Answering the Min-Cost Quality-Aware Query on Multi-sources in Sensor-Cloud Systems 传感器云系统中多源最小成本质量感知查询的回答
Mohan Li, Yu Jiang, Yanbin Sun, Zhihong Tian
{"title":"Answering the Min-Cost Quality-Aware Query on Multi-sources in Sensor-Cloud Systems","authors":"Mohan Li, Yu Jiang, Yanbin Sun, Zhihong Tian","doi":"10.1007/978-3-030-05345-1_13","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_13","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129394728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Secure Passive Keyless Entry and Start System Using Machine Learning 使用机器学习的安全被动无钥匙进入和启动系统
Usman Ahmad, Hong Song, Awais Bilal, M. Alazab, A. Jolfaei
{"title":"Secure Passive Keyless Entry and Start System Using Machine Learning","authors":"Usman Ahmad, Hong Song, Awais Bilal, M. Alazab, A. Jolfaei","doi":"10.1007/978-3-030-05345-1_26","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_26","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133902253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical Systems 网络物理系统安全需求工程框架的系统映射研究
S. Réhman, V. Gruhn, Saad Shafiq, Irum Inayat
{"title":"A Systematic Mapping Study on Security Requirements Engineering Frameworks for Cyber-Physical Systems","authors":"S. Réhman, V. Gruhn, Saad Shafiq, Irum Inayat","doi":"10.1007/978-3-030-05345-1_37","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_37","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117298673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Research on Wireless Spectrum Sensing Technology Based on Machine Learning 基于机器学习的无线频谱感知技术研究
Heng Xiao, Xianchun Zhou, Yue Tian
{"title":"Research on Wireless Spectrum Sensing Technology Based on Machine Learning","authors":"Heng Xiao, Xianchun Zhou, Yue Tian","doi":"10.1007/978-3-030-05345-1_41","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_41","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132743026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure and Privacy Preserving RFID Based Access Control to Smart Buildings 基于RFID的智能建筑安全与隐私保护访问控制
Ahmed Raad Al-Sudani, Shang Gao, S. Wen, Muhmmad Al-Khiza'ay
{"title":"Secure and Privacy Preserving RFID Based Access Control to Smart Buildings","authors":"Ahmed Raad Al-Sudani, Shang Gao, S. Wen, Muhmmad Al-Khiza'ay","doi":"10.1007/978-3-030-05345-1_12","DOIUrl":"https://doi.org/10.1007/978-3-030-05345-1_12","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114551069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信