紧张过度 发表于 2025-3-26 22:02:40

http://reply.papertrans.cn/103/10290/1028937/1028937_31.png

恭维 发表于 2025-3-27 04:46:20

http://reply.papertrans.cn/103/10290/1028937/1028937_32.png

FID 发表于 2025-3-27 08:12:12

Randomized Skip Graph-Based Authentication for Large-Scale RFID Systems, tags. However, the degree of tags’ privacy will decrease should some tags in the system be compromised by correlating tampered group keys. Improving the degree of tags’ privacy in keeping with fast authentication speed is equivalent to reducing the correlation probability of group keys. To this end

摸索 发表于 2025-3-27 11:11:21

http://reply.papertrans.cn/103/10290/1028937/1028937_34.png

GRE 发表于 2025-3-27 17:09:05

A New Paradigm for Shortest Link Scheduling in Wireless Networks: Theory and Applications, for . in wireless networks are resorted to the ellipsoid method for linear programming exclusively. However, the ellipsoid method can require an inordinate amount of running time and memory even for a moderate sized input, and consequently is often unusable in practice. This paper presents a comple

最低点 发表于 2025-3-27 20:12:35

http://reply.papertrans.cn/103/10290/1028937/1028937_36.png

BROOK 发表于 2025-3-28 00:36:21

CNFD: A Novel Scheme to Detect Colluded Non-technical Loss Fraud in Smart Grid,s where there is only one independent adversary, a colluded non-technical loss fraud happens when a smart meter is tampered by one or more co-existing or collaborating adversaries. The behavior of one adversary may be covered by others and cannot be detected easily by the traditional detection metho

预知 发表于 2025-3-28 05:19:46

http://reply.papertrans.cn/103/10290/1028937/1028937_38.png

原谅 发表于 2025-3-28 08:18:28

http://reply.papertrans.cn/103/10290/1028937/1028937_39.png

sultry 发表于 2025-3-28 14:18:13

http://reply.papertrans.cn/103/10290/1028937/1028937_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Wireless Algorithms, Systems, and Applications; 11th International C Qing Yang,Wei Yu,Yacine Challal Conference proceedings 2016 Springer I