Zobrazeno 1 - 10
of 309
pro vyhledávání: '"Sihan Qing"'
Autor:
Jan H. P. Eloff, Sihan Qing
Publikováno v:
Information Security for Global Information Infrastructures ISBN: 9781475754797
Erratum to: Sihan. Qing and Jan. H.P. Eloff (Eds.) Information Security for Global Information Infrastructures DOI: 10.1007/978-0-387-35515-3
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9749872972331055538b799767b3602e
https://doi.org/10.1007/978-0-387-35515-3_53
https://doi.org/10.1007/978-0-387-35515-3_53
Publikováno v:
Information Sciences. 321:162-178
We show a number of latest privacy-preserving two-factor schemes are problematic.De-synchronization attack is a serious threat to anonymous schemes and deserves attention.We present a new scheme to overcome the identified flaws with nearly no additio
This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017. The 43 revised full papers and 14 short papers presented were carefu
Autor:
David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi
This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefull
This book constitutes the refereed proceedings of the 18th International Conference on Information and Communications Security, ICISC 2016, held in Singapore, Singapore, in November/December 2016.The 20 revised full papers and 16 short papers presen
This book constitutes the thoroughly refereed post-conference proceedings of the 17th International Conference on Information and Communications Security, ICISC 2015, held in Beijing, China, in December 2015.The 24 revised full papers and 19 short
Publikováno v:
Information and Communications Security ISBN: 9783319298139
ICICS
ICICS
The deduplication technology can significantly reduce the amount of storage in data centers, thus to save network bandwidth and decrease the cost of construction and maintenance. Having inspired by the sliding block method of the Sliding Block (SB) a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bb15743ceed880f19290d45d7ef81e50
https://doi.org/10.1007/978-3-319-29814-6_34
https://doi.org/10.1007/978-3-319-29814-6_34
Publikováno v:
Information and Communications Security ISBN: 9783319500102
ICICS
ICICS
Live migration of virtual machine is the process of moving VMs from one physical server to another server keeping services running in VMs, and facilitates load balancing, energy saving, hardware dependent, remote migration and so on. This novel techn
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d53f405bbb80b7cbbc59d22a7f737d1a
https://doi.org/10.1007/978-3-319-50011-9_5
https://doi.org/10.1007/978-3-319-50011-9_5
Publikováno v:
Journal of Electronics & Information Technology. 33:1271-1276
Publikováno v:
Peer-to-Peer Networking and Applications. 4:178-191
Deceptive voting behaviors of malicious users are known as the main reason of causing content pollution in Peer-to-Peer (P2P) content sharing systems. Due to the nature of P2P overlay network such as self-organization and anonymity, the existing meth