The proceedings contain 184 papers. The topics discussed include: a dynamic access control scheme for outsourced database;a mandatory access control model based on concept lattice;a user access policy based on dynamic...
ISBN:
(纸本)9780769543550
The proceedings contain 184 papers. The topics discussed include: a dynamic access control scheme for outsourced database;a mandatory access control model based on concept lattice;a user access policy based on dynamic sensitivity label;an extensible framework for RBAC in dynamic ad-hoc coalitions;a new directed-threshold multi-signature scheme without trusted share distribution center;an active-passive security protection method for remote sensing image;an efficient certificateless signature scheme from bilinear parings;research of the automatic shrinking-film labeling machine based on the data bus;a divide-and-conquer system based neural networks for forecasting time series;a new approach to estimate RED parameters using global congestion notification;a novel hybrid method based on genetic algorithms and neural networks;advances in research of fuzzy C-means clustering algorithm;and configuration design and sizing optimization of a winged airship.
The proceedings contain 184 papers. The topics discussed include: a dynamic access control scheme for outsourced database;a mandatory access control model based on concept lattice;a user access policy based on dynamic...
ISBN:
(纸本)9780769543550
The proceedings contain 184 papers. The topics discussed include: a dynamic access control scheme for outsourced database;a mandatory access control model based on concept lattice;a user access policy based on dynamic sensitivity label;an extensible framework for RBAC in dynamic ad-hoc coalitions;a new directed-threshold multi-signature scheme without trusted share distribution center;an active-passive security protection method for remote sensing image;an efficient certificateless signature scheme from bilinear parings;research of the automatic shrinking-film labeling machine based on the data bus;a divide-and-conquer system based neural networks for forecasting time series;a new approach to estimate RED parameters using global congestion notification;a novel hybrid method based on genetic algorithms and neural networks;advances in research of fuzzy C-means clustering algorithm;and configuration design and sizing optimization of a winged airship.
The proceedings contain 104 papers. The special focus in this conference is on networkcomputing and informationsecurity. The topics include: on the isomorphism classes of elliptic curves with 2-torsion points;templa...
ISBN:
(纸本)9783642352102
The proceedings contain 104 papers. The special focus in this conference is on networkcomputing and informationsecurity. The topics include: on the isomorphism classes of elliptic curves with 2-torsion points;template-based and second-order differential power analysis attacks on masking;design and implementation of Linux file mandatory access control;design and application of fine-grained access control model;intel SYSRET privilege escalation vulnerability analysis;analysis of cloud security and a reliable transmission based on UDP;a survey of passive image forensics;a novel fast ?-adapt slide window elliptic curve cryptography algorithm;application of neural network and cluster analysis in anomaly detection;clustering system call arguments for remote attestation;document selective protection based on third service framework;fine-grain trusted storage and transitivity policy for open network environment;a deep understanding of cloud computingsecurity;study of layers construct for data mining platform based on cloud computing;cloud task and virtual machine allocation strategy in cloud computing environment;GIS application model based on cloud computing;development framework for cloud services;research on distributed file system with hadoop;optimization of green passive optical networks with minimum cost;primary educational resources classification study based on gagne learning classification theory;a special subject database in CALIS project;the design and implementation of automatic drug matching system;asymmetric encryption scheme based on fingerprint topological transformation;a kind of digital signature system based on linear computing;cryptanalysis and improvement of an efficient certificateless signature scheme;robust software watermarking scheme using RC4 and HASH;a novel digital watermarking method based on lifting wavelet transform;a new practical template attack of AES;multi-granule association rule mining based on quantitative concept lattice;brushless
The 2011 international conference on network computing and information security (NCIS 2011) and the 2011 internationalconference on Multimedia and Signal Processing (CMSP 2011) will be jointly held at Guilin,
The 2011 international conference on network computing and information security (NCIS 2011) and the 2011 internationalconference on Multimedia and Signal Processing (CMSP 2011) will be jointly held at Guilin,
The proceedings contain 106 papers. The special focus in this conference is on NCUS 2006 Symposium, SecUbiq 2006 Workshop, USN 2006 Workshop, TRUST 2006 Workshop, ESO 2006 Workshop and MSA 2006 Workshop. The topics in...
ISBN:
(纸本)3540368507
The proceedings contain 106 papers. The special focus in this conference is on NCUS 2006 Symposium, SecUbiq 2006 Workshop, USN 2006 Workshop, TRUST 2006 Workshop, ESO 2006 Workshop and MSA 2006 Workshop. The topics include: A preliminary study on impact of dying of solution on Adaptive Router Promotion in Ad-Hoc networks, A Utility-Based Auction Cooperation Incentive Mechanism in Peer-to-Peer networks, UbiqStor: Server and Proxy for Remote Storage of Mobile Devices, Packet Length Adaptation for Energy-Proportional Routing in Clustered Sensor networks, A New Context Script Language for Developing Context-Aware Application Systems in Ubiquitous computing, Dynamic Replication Strategies for Object Storage Systems, A Cost-Effective Mobility Modelling in Nested network Mobility, Completing UML Model of Component-Based System with Middleware for Performance Evaluation, Energy Efficient PNC Selection Procedure for the IEEE 802.15.3-Based HR-WPAN, An Efficient Multicast Routing Protocol in Multi-rate Wireless Ad Hoc networks, and WPAN Platform Design in Handset Integrating Cellular network and Its Application to Mobile Games.
The proceedings contain 23 papers. The special focus in this conference is on NCUS 2006 Symposium. The topics include: Adaptive router promotion in ad-hoc networks;a utility-based auction cooperation incentive mechani...
ISBN:
(纸本)3540688544
The proceedings contain 23 papers. The special focus in this conference is on NCUS 2006 Symposium. The topics include: Adaptive router promotion in ad-hoc networks;a utility-based auction cooperation incentive mechanism in peer-to-peer networks;ubiqstor: server and proxy for remote storage of mobile devices;packet length adaptation for energy-proportional routing in clustered sensor networks;a new context script language for developing context-aware application systems in ubiquitous computing;dynamic replication strategies for object storage systems;a cost-effective mobility modelling in nested network mobility;completing uml model of component-based system with middleware for performance evaluation;energy efficient PNC selection procedure for the IEEE 802.15.3-Based HR-WPAN;an efficient multicast routing protocol in multi-rate wireless ad hoc networks;WPAN platform design in handset integrating cellular network and its application to mobile games;reliable transporting and optimal routing on rate-based for ad hoc networks;and automatic extraction of conversation protocols from a choreography specification of ubiquitous web services;inter-sector interference mitigation method in triple-sectored OFDMA systems.
The proceedings contain 46 papers. The special focus in this conference is on security and information Technologies with AI. The topics include: Authentication of Image Fidelity in Watermarking-QR-Code Approving Copyr...
ISBN:
(纸本)9789819777853
The proceedings contain 46 papers. The special focus in this conference is on security and information Technologies with AI. The topics include: Authentication of Image Fidelity in Watermarking-QR-Code Approving Copyright Systems;a Zero-Watermarking Image Scheme in Normalized Cross-Correlation with Robust Copyright Protections;a Novel Approach for Detecting and Analyzing Cyber-Attacks in Cyber-Physical Systems;white-Box Penetration Testing for Hash Collision Attack on Web Applications;towards Zero Trust for Financial Sectors: A Proposed Framework on Trust Evaluation;FiT-DPKI: Decentralized Public Key Infrastructure with Flexibility and Transparency for IoT networks;Revolutionizing Healthcare: Case Studies of AI Algorithms Transforming the Field of Medicine;analysis and Detection of Abnormal Transactions on Ethereum;feasibility Analysis Study on Constructing a Grid Intrusion Detection System Using Semi-supervised Learning Models;Securing NLP Systems: A Comprehensive AI-Based Approach;A New Scheme Modeling Gym Membership Transactions with NFT Systems;A Text to Human-Like Speech Using Tacotron-Based TTS Model;A Novel Malware Classification Using CNN-SVM Deep Learning Method Based on Transfer Learning Architecture;enhancing Project Programming Hour Prediction with Regression Analysis Techniques—A Case Study of Company D;a New Traceable One-Time Address Scheme Secure Against Privilege Escalation Attack;An Object-Based Multi-level Authentication Framework for AR e-Book;a Door Lock System Based on Visual Cryptography;Automatic APT Attack Reconstruction Supporting Lateral Movement;using Open-Source Intelligence to Archive Criminal Organizations;FIDO-Based Access Control Mechanism in Named Data networking;empirical Approach to a Fine-Tuning Using Forgetting in Large Language Models;automatic Wound Segmentation with Deep Convolutional Neural networks;Prediction of the Prevalence of COVID-19 Using Epidemic Differential Equations and Deep Learning network.
The tobacco industry faces numerous networksecurity challenges during its digital transformation. With the picture of Chinese information technology application innovation (ITAI), networksecurity issues have become ...
详细信息
The tobacco industry faces numerous networksecurity challenges during its digital transformation. With the picture of Chinese information technology application innovation (ITAI), networksecurity issues have become more prominent. This article explores to evaluate networksecurity in the tobacco industry's digital environment by verification and testing. First, it proposes a security index system for ITAI products. Second, it conducts formal verification using the ProVerif to detect vulnerabilities and security issues in the network system in the ITAI environment. Thirdly, a combination testing method is designed to assess the security of ITAI hosts and security defense products. Through formal verification and testing, this research provides theoretical support and practical guidance for networksecurity protection in the tobacco industry's digital environment.
Trusted computing technology represents a significant element of cyber security systems, serving to guarantee the integrity and accessibility of data and systems. The incorporation of Trusted computing introduces a se...
详细信息
暂无评论