International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage最新文献

筛选
英文 中文
A Reputation Model Considering Repurchase Behavior and Mechanism Design to Promote Repurchase 考虑回购行为的信誉模型及促进回购的机制设计
Y. Liu, Jin Bai, G. Guo, Xingwei Wang, Zhenhua Tan
{"title":"A Reputation Model Considering Repurchase Behavior and Mechanism Design to Promote Repurchase","authors":"Y. Liu, Jin Bai, G. Guo, Xingwei Wang, Zhenhua Tan","doi":"10.1007/978-3-319-72389-1_21","DOIUrl":"https://doi.org/10.1007/978-3-319-72389-1_21","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129577925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comprehensive Diversity in Recommender Systems 推荐系统的全面多样性
T. Zuva, Raoul Kwuimi
{"title":"Comprehensive Diversity in Recommender Systems","authors":"T. Zuva, Raoul Kwuimi","doi":"10.1007/978-3-319-72389-1_45","DOIUrl":"https://doi.org/10.1007/978-3-319-72389-1_45","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128773359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Authorship Analysis of Social Media Contents Using Tone and Personality Features 基于语气和个性特征的社交媒体内容作者分析
A. Usha, S. Thampi
{"title":"Authorship Analysis of Social Media Contents Using Tone and Personality Features","authors":"A. Usha, S. Thampi","doi":"10.1007/978-3-319-72389-1_18","DOIUrl":"https://doi.org/10.1007/978-3-319-72389-1_18","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133580540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Relacha: Using Associative Meaning for Image Captcha Understandability Relacha:使用图像Captcha可理解性的关联含义
Songjie Wei, Qianqian Wu, Milin Ren
{"title":"Relacha: Using Associative Meaning for Image Captcha Understandability","authors":"Songjie Wei, Qianqian Wu, Milin Ren","doi":"10.1007/978-3-319-72389-1_29","DOIUrl":"https://doi.org/10.1007/978-3-319-72389-1_29","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127303566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Unified Model for Detecting Privacy Leakage on Android Android平台隐私泄露检测的统一模型
Xueqi Ren, Xinming Wang, Hua Tang, Zhaohui Ma, Jiechao Wu, Gansen Zhao
{"title":"A Unified Model for Detecting Privacy Leakage on Android","authors":"Xueqi Ren, Xinming Wang, Hua Tang, Zhaohui Ma, Jiechao Wu, Gansen Zhao","doi":"10.1007/978-3-319-72389-1_38","DOIUrl":"https://doi.org/10.1007/978-3-319-72389-1_38","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128936191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine Introspection 通过远程虚拟机自省从IaaS云解耦安全服务
Huaizhe Zhou, Haihe Ba, Jiangchun Ren, Yongjun Wang, Zhiying Wang, Yunshi Li
{"title":"Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine Introspection","authors":"Huaizhe Zhou, Haihe Ba, Jiangchun Ren, Yongjun Wang, Zhiying Wang, Yunshi Li","doi":"10.1007/978-3-319-72389-1_41","DOIUrl":"https://doi.org/10.1007/978-3-319-72389-1_41","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125185712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Lengthening Unidimensional Continuous-Variable Quantum Key Distribution with Noiseless Linear Amplifier 用无噪声线性放大器延长一维连续变量量子密钥分布
Yu Cao, Jianwu Liang, Ying Guo
{"title":"Lengthening Unidimensional Continuous-Variable Quantum Key Distribution with Noiseless Linear Amplifier","authors":"Yu Cao, Jianwu Liang, Ying Guo","doi":"10.1007/978-3-319-72389-1_3","DOIUrl":"https://doi.org/10.1007/978-3-319-72389-1_3","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127657665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Color Image Encryption Scheme Based on Chaotic Hénon Map and Lü System 基于混沌hsamnon映射和Lü系统的彩色图像加密新方案
Chong Fu, G. Zhang, Bei-li Gao, Jing Sun, Xue Wang
{"title":"A New Color Image Encryption Scheme Based on Chaotic Hénon Map and Lü System","authors":"Chong Fu, G. Zhang, Bei-li Gao, Jing Sun, Xue Wang","doi":"10.1007/978-3-319-72389-1_35","DOIUrl":"https://doi.org/10.1007/978-3-319-72389-1_35","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127720407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Distributed Authentication Protocol Using Identity-Based Encryption and Blockchain for LEO Network 基于身份加密和区块链的分布式LEO网络认证协议
Shuai Li, Meilin Liu, Songjie Wei
{"title":"A Distributed Authentication Protocol Using Identity-Based Encryption and Blockchain for LEO Network","authors":"Shuai Li, Meilin Liu, Songjie Wei","doi":"10.1007/978-3-319-72389-1_36","DOIUrl":"https://doi.org/10.1007/978-3-319-72389-1_36","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122611388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
PCSD: A Tool for Android Malware Detection PCSD: Android恶意软件检测工具
Bo Leng, Jianbin Li, Yang Xu, Liang She, Wuqiang Gao, Quanrun Zeng
{"title":"PCSD: A Tool for Android Malware Detection","authors":"Bo Leng, Jianbin Li, Yang Xu, Liang She, Wuqiang Gao, Quanrun Zeng","doi":"10.1007/978-3-319-72389-1_17","DOIUrl":"https://doi.org/10.1007/978-3-319-72389-1_17","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"9 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128581578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信