International Symposium on Security and Privacy in Social Networks and Big Data最新文献

筛选
英文 中文
A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds 云环境下微视频订阅系统的安全细粒度身份代理广播重加密方案
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 2019-07-14 DOI: 10.1007/978-981-15-0758-8_11
Chunpeng Ge, Lu Zhou, Jinyue Xia, Pawel Szalachowski, Chunhua Su
{"title":"A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds","authors":"Chunpeng Ge, Lu Zhou, Jinyue Xia, Pawel Szalachowski, Chunhua Su","doi":"10.1007/978-981-15-0758-8_11","DOIUrl":"https://doi.org/10.1007/978-981-15-0758-8_11","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126497668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing 一种新的基于格的密文-基于策略属性的云共享代理重加密
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 2019-07-14 DOI: 10.1007/978-981-15-0758-8_3
Juyan Li, Chunguang Ma, Kejia Zhang
{"title":"A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing","authors":"Juyan Li, Chunguang Ma, Kejia Zhang","doi":"10.1007/978-981-15-0758-8_3","DOIUrl":"https://doi.org/10.1007/978-981-15-0758-8_3","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124138256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain-Based Threshold Electronic Voting System 基于区块链的门槛电子投票系统
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 2019-07-14 DOI: 10.1007/978-981-15-0758-8_18
Boru Gong, Xingye Lu, Wang Fat Lau, M. Au
{"title":"Blockchain-Based Threshold Electronic Voting System","authors":"Boru Gong, Xingye Lu, Wang Fat Lau, M. Au","doi":"10.1007/978-981-15-0758-8_18","DOIUrl":"https://doi.org/10.1007/978-981-15-0758-8_18","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131935271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An RTP Extension for Reliable User-Data Transmission over VoIP Traffic 在VoIP流量上可靠的用户数据传输RTP扩展
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 2019-07-14 DOI: 10.1007/978-981-15-0758-8_6
Jinbao Gao, Yuan-zhang Li, Hongwei Jiang, Lu Liu, Xiaosong Zhang
{"title":"An RTP Extension for Reliable User-Data Transmission over VoIP Traffic","authors":"Jinbao Gao, Yuan-zhang Li, Hongwei Jiang, Lu Liu, Xiaosong Zhang","doi":"10.1007/978-981-15-0758-8_6","DOIUrl":"https://doi.org/10.1007/978-981-15-0758-8_6","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132360228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Authenticated Continuous Top-k Spatial Keyword Search on Dynamic Objects 动态对象的认证连续Top-k空间关键字搜索
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-19-7242-3_3
Yetneberk Zenebe Melesew, Jiayi Li, Yinbin Miao
{"title":"Authenticated Continuous Top-k Spatial Keyword Search on Dynamic Objects","authors":"Yetneberk Zenebe Melesew, Jiayi Li, Yinbin Miao","doi":"10.1007/978-981-19-7242-3_3","DOIUrl":"https://doi.org/10.1007/978-981-19-7242-3_3","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124785151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Adaptive Fault Diagnosis Algorithm for Highly Scalable Data Center Networks 高扩展数据中心网络中一种有效的自适应故障诊断算法
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-7913-1_4
Xiang-dong Wang, Yu You, Xiao-Yan Li, Ximeng Liu, Yang Yang
{"title":"An Efficient Adaptive Fault Diagnosis Algorithm for Highly Scalable Data Center Networks","authors":"Xiang-dong Wang, Yu You, Xiao-Yan Li, Ximeng Liu, Yang Yang","doi":"10.1007/978-981-16-7913-1_4","DOIUrl":"https://doi.org/10.1007/978-981-16-7913-1_4","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124984008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge Local Differential Privacy for Dynamic Graphs 动态图的边缘局部差分隐私
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-5177-2_13
Sudipta Paul, Julián Salas, V. Torra
{"title":"Edge Local Differential Privacy for Dynamic Graphs","authors":"Sudipta Paul, Julián Salas, V. Torra","doi":"10.1007/978-981-99-5177-2_13","DOIUrl":"https://doi.org/10.1007/978-981-99-5177-2_13","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117019684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Fault Tolerant Routing Algorithm in Data Center Networks 数据中心网络中容错路由算法的性能评估
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-7913-1_2
Ningning Liu, Weibei Fan, Jianxi Fan
{"title":"Performance Evaluation of Fault Tolerant Routing Algorithm in Data Center Networks","authors":"Ningning Liu, Weibei Fan, Jianxi Fan","doi":"10.1007/978-981-16-7913-1_2","DOIUrl":"https://doi.org/10.1007/978-981-16-7913-1_2","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129217531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Realization of Safety Reinforced Terminal Equipment for Secondary System of Substation 变电站二次系统安全加固终端设备的实现
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-16-7913-1_5
Xiaoming Wang, Ke-Wen Zhou, C. Wu
{"title":"Realization of Safety Reinforced Terminal Equipment for Secondary System of Substation","authors":"Xiaoming Wang, Ke-Wen Zhou, C. Wu","doi":"10.1007/978-981-16-7913-1_5","DOIUrl":"https://doi.org/10.1007/978-981-16-7913-1_5","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121520497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Social and Technological Incentives for Cybercriminals to Engage in Ransomware Activities 网络罪犯参与勒索软件活动的社会和技术激励
International Symposium on Security and Privacy in Social Networks and Big Data Pub Date : 1900-01-01 DOI: 10.1007/978-981-99-5177-2_9
Yichao Wang, Sophia Roscoe, B. Arief, L. Connolly, H. Borrion, S. Kaddoura
{"title":"The Social and Technological Incentives for Cybercriminals to Engage in Ransomware Activities","authors":"Yichao Wang, Sophia Roscoe, B. Arief, L. Connolly, H. Borrion, S. Kaddoura","doi":"10.1007/978-981-99-5177-2_9","DOIUrl":"https://doi.org/10.1007/978-981-99-5177-2_9","url":null,"abstract":"","PeriodicalId":415860,"journal":{"name":"International Symposium on Security and Privacy in Social Networks and Big Data","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132465965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信