Pub Date : 2017-12-12DOI: 10.1007/978-3-319-72389-1_21
Y. Liu, Jin Bai, G. Guo, Xingwei Wang, Zhenhua Tan
{"title":"A Reputation Model Considering Repurchase Behavior and Mechanism Design to Promote Repurchase","authors":"Y. Liu, Jin Bai, G. Guo, Xingwei Wang, Zhenhua Tan","doi":"10.1007/978-3-319-72389-1_21","DOIUrl":"https://doi.org/10.1007/978-3-319-72389-1_21","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129577925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-12DOI: 10.1007/978-3-319-72389-1_45
T. Zuva, Raoul Kwuimi
{"title":"Comprehensive Diversity in Recommender Systems","authors":"T. Zuva, Raoul Kwuimi","doi":"10.1007/978-3-319-72389-1_45","DOIUrl":"https://doi.org/10.1007/978-3-319-72389-1_45","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128773359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-12DOI: 10.1007/978-3-319-72389-1_18
A. Usha, S. Thampi
{"title":"Authorship Analysis of Social Media Contents Using Tone and Personality Features","authors":"A. Usha, S. Thampi","doi":"10.1007/978-3-319-72389-1_18","DOIUrl":"https://doi.org/10.1007/978-3-319-72389-1_18","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133580540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-12DOI: 10.1007/978-3-319-72389-1_29
Songjie Wei, Qianqian Wu, Milin Ren
{"title":"Relacha: Using Associative Meaning for Image Captcha Understandability","authors":"Songjie Wei, Qianqian Wu, Milin Ren","doi":"10.1007/978-3-319-72389-1_29","DOIUrl":"https://doi.org/10.1007/978-3-319-72389-1_29","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127303566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Unified Model for Detecting Privacy Leakage on Android","authors":"Xueqi Ren, Xinming Wang, Hua Tang, Zhaohui Ma, Jiechao Wu, Gansen Zhao","doi":"10.1007/978-3-319-72389-1_38","DOIUrl":"https://doi.org/10.1007/978-3-319-72389-1_38","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128936191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-12DOI: 10.1007/978-3-319-72389-1_3
Yu Cao, Jianwu Liang, Ying Guo
{"title":"Lengthening Unidimensional Continuous-Variable Quantum Key Distribution with Noiseless Linear Amplifier","authors":"Yu Cao, Jianwu Liang, Ying Guo","doi":"10.1007/978-3-319-72389-1_3","DOIUrl":"https://doi.org/10.1007/978-3-319-72389-1_3","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127657665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-12DOI: 10.1007/978-3-319-72389-1_35
Chong Fu, G. Zhang, Bei-li Gao, Jing Sun, Xue Wang
{"title":"A New Color Image Encryption Scheme Based on Chaotic Hénon Map and Lü System","authors":"Chong Fu, G. Zhang, Bei-li Gao, Jing Sun, Xue Wang","doi":"10.1007/978-3-319-72389-1_35","DOIUrl":"https://doi.org/10.1007/978-3-319-72389-1_35","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127720407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-12DOI: 10.1007/978-3-319-72389-1_36
Shuai Li, Meilin Liu, Songjie Wei
{"title":"A Distributed Authentication Protocol Using Identity-Based Encryption and Blockchain for LEO Network","authors":"Shuai Li, Meilin Liu, Songjie Wei","doi":"10.1007/978-3-319-72389-1_36","DOIUrl":"https://doi.org/10.1007/978-3-319-72389-1_36","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122611388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-12DOI: 10.1007/978-3-319-72389-1_17
Bo Leng, Jianbin Li, Yang Xu, Liang She, Wuqiang Gao, Quanrun Zeng
{"title":"PCSD: A Tool for Android Malware Detection","authors":"Bo Leng, Jianbin Li, Yang Xu, Liang She, Wuqiang Gao, Quanrun Zeng","doi":"10.1007/978-3-319-72389-1_17","DOIUrl":"https://doi.org/10.1007/978-3-319-72389-1_17","url":null,"abstract":"","PeriodicalId":399074,"journal":{"name":"International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage","volume":"9 17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128581578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}