A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks (Englisch)
- Neue Suche nach: Zhang, Z.
- Neue Suche nach: Wang, K.
- Neue Suche nach: Zhang, Z.
- Neue Suche nach: Wang, K.
In:
COMPUTER JOURNAL
;
58
, 4
;
668-678
;
2015
-
ISSN:
- Aufsatz (Zeitschrift) / Print
-
Titel:A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks
-
Beteiligte:
-
Erschienen in:COMPUTER JOURNAL ; 58, 4 ; 668-678
-
Verlag:
- Neue Suche nach: Oxford University Press
-
Erscheinungsdatum:01.01.2015
-
Format / Umfang:11 pages
-
ISSN:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 510.78 / 510
- Weitere Informationen zu Dewey Decimal Classification
-
Klassifikation:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis – Band 58, Ausgabe 4
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 515
-
Security, Trust and Risk in Multimedia Social NetworksZhang, Zhiyong et al. | 2015
- 518
-
Privacy and Security for Multimedia Content shared on OSNs: Issues and CountermeasuresPatsakis, Constantinos / Zigomitros, Athanasios / Papageorgiou, Achilleas / Solanas, Agusti et al. | 2015
- 536
-
Information Diffusion Model Based on Privacy Setting in Online Social Networking ServicesZhu, Hui / Huang, Cheng / Li, Hui et al. | 2015
- 549
-
Privacy-Preserving Data Publication with Features of Independent l-DiversityHong Zhu et al. | 2015
- 549
-
Privacy-Preserving Data Publication with Features of Independent {ell}-DiversityZhu, Hong / Tian, Shengli / Lü, Kevin et al. | 2015
- 572
-
Approach to Detecting Type-Flaw Attacks Based on Extended Strand SpacesSong, WeiTao / Hu, Bin et al. | 2015
- 588
-
Exposing Photographic Splicing by Detecting the Inconsistencies in ShadowsYang, Bin / Sun, Xingming / Chen, Xianyi / Zhang, Jianjun / Li, Xu et al. | 2015
- 601
-
Taxonomy for Trust Models in Cloud ComputingKanwal, Ayesha / Masood, Rahat / Shibli, Muhammad Awais / Mumtaz, Rafia et al. | 2015
- 627
-
A Strong and Weak Ties Feedback-Based Trust Model in Multimedia Social NetworksPei, Qingqi / Yan, Dingyu / Ma, Lichuan / Li, Zi / Liao, Yang et al. | 2015
- 644
-
Sensational Headline Identification By Normalized Cross Entropy-Based MetricYang, Zhen / Gao, Kaiming / Fan, Kefeng / Lai, Yingxu et al. | 2015
- 656
-
CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless NetworksLin, Hui / Hu, Jia / Ma, Jianfeng / Xu, Li / Yang, Li et al. | 2015
- 668
-
A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social NetworksZhang, Zhiyong / Wang, Kanliang et al. | 2015
- 679
-
Multilevel Analysis to Detect Covert Social Botnet in Multimedia Social NetworksNatarajan, V. / Sheen, Shina / Anitha, R. et al. | 2015
- 688
-
A Trust Routing for Multimedia Social NetworksWu, Guowei / Liu, Zuosong / Yao, Lin / Deng, Jing / Wang, Jie et al. | 2015
- 700
-
A Composition and Recovery Strategy for Mobile Social Network Service in DisasterNiu, Danmei / Rui, Lanlan / Zhong, Cheng / Qiu, Xuesong et al. | 2015
- 709
-
Security Certification for Service-Based Business EcosystemsLotz, Volkmar / Di Cerbo, Francesco / Bezzi, Michele / Kaluvuri, Samuel Paul / Sabetta, Antonino / Trabelsi, Slim et al. | 2015
- 724
-
Extend the Concept of Public Key Encryption with Delegated SearchTang, Qiang / Ma, Hua / Chen, Xiaofeng et al. | 2015
- 735
-
Functional Encryption Resilient to Hard-to-Invert LeakageZhang, Mingwu / Wang, Chunzhi / Takagi, Tsuyoshi / Mu, Yi et al. | 2015
- 750
-
Leakage-Free ID-Based SignatureTseng, Yuh-Min / Tsai, Tung-Tso / Huang, Sen-Shan et al. | 2015
- 758
-
MC-2D: An Efficient and Scalable Multicoupon SchemeHinarejos, M. Francisca / Isern-Deyà, Andreu Pere / Ferrer-Gomila, Josep-Lluís / Payeras-Capellà, Magdalena et al. | 2015
- 779
-
Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'Tang, Ying-Kai / Chow, Sherman S.M. / Liu, Joseph K. et al. | 2015
- 782
-
Password Capabilities RevisitedLopriore, Lanfranco et al. | 2015
- 792
-
Efficient Identity-Based Proxy Signature in the Standard ModelGu, Ke / Jia, Weijia / Jiang, Chunlin et al. | 2015
- 808
-
Detection of Cross-Site Scripting Attack under Multiple ScenariosDas, Debasish / Sharma, Utpal / Bhattacharyya, D.K. et al. | 2015
- 823
-
On Indistinguishability in Remote Data Integrity CheckingFan, Xinyu / Yang, Guomin / Mu, Yi / Yu, Yong et al. | 2015
- 831
-
Official Arbitration with Secure Cloud Storage ApplicationKüpçü, Alptekin et al. | 2015
- 853
-
A Forward-Secure Certificate-Based Signature SchemeLi, Jiguo / Teng, Huiyun / Huang, Xinyi / Zhang, Yichen / Zhou, Jianying et al. | 2015
- 867
-
Secure Delegation of Signing Power from FactorizationYu, Yong / Au, Man Ho / Mu, Yi / Susilo, Willy / Wu, Huai et al. | 2015
- 878
-
A New Approach for Network Vulnerability AnalysisVu, Hai L. / Khaw, Kenneth K. / Chen, Tsong Yueh et al. | 2015
- 892
-
FHSD: An Improved IP Spoof Detection Method for Web DDoS AttacksShiaeles, Stavros N. / Papadaki, Maria et al. | 2015
- 904
-
Lower Bounds of Differential and Linear Active S-boxes for 3D-like StructureLiu, Huacui / Jin, Chenhui et al. | 2015
- 922
-
SPEKS: Secure Server-Designation Public Key Encryption with Keyword Search against Keyword Guessing AttacksChen, Yu-Chi et al. | 2015
- 934
-
Toward A Secure Single Sign-On Mechanism for Distributed Computer NetworksLee, Cheng-Chi / Lai, Yan-Ming et al. | 2015
- 944
-
Watermarking Protocols: Problems, Challenges and a Possible SolutionFrattolillo, Franco et al. | 2015
- 961
-
Application of Simple Power Analysis to Stream Ciphers Constructed Using Feedback Shift RegistersZadeh, Abdulah Abdulah / Heys, Howard M. et al. | 2015
- 973
-
Adaptive Caching Approach to Prevent DNS Cache Poisoning AttackHmood, Haider Salim / Li, Zhitang / Abdulwahid, Hasan Khalaf / Zhang, Yang et al. | 2015
- 986
-
Public Key Encryption with Delegated Equality Test in a Multi-User SettingMa, Sha / Zhang, Mingwu / Huang, Qiong / Yang, Bo et al. | 2015
- 1003
-
From Ephemerizer to Timed-Ephemerizer: Achieve Assured Lifecycle Enforcement for Sensitive DataTang, Qiang et al. | 2015
- 1021
-
An Identity-Based Multi-Proxy Multi-Signature Scheme Without Bilinear Pairings and its VariantsAsaar, Maryam Rajabzadeh / Salmasizadeh, Mahmoud / Susilo, Willy et al. | 2015