Osteopenia 发表于 2025-3-21 16:20:55
书目名称Advances in Intelligent Systems and Applications - Volume 2影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0148547<br><br> <br><br>书目名称Advances in Intelligent Systems and Applications - Volume 2影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0148547<br><br> <br><br>书目名称Advances in Intelligent Systems and Applications - Volume 2网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0148547<br><br> <br><br>书目名称Advances in Intelligent Systems and Applications - Volume 2网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0148547<br><br> <br><br>书目名称Advances in Intelligent Systems and Applications - Volume 2被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0148547<br><br> <br><br>书目名称Advances in Intelligent Systems and Applications - Volume 2被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0148547<br><br> <br><br>书目名称Advances in Intelligent Systems and Applications - Volume 2年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0148547<br><br> <br><br>书目名称Advances in Intelligent Systems and Applications - Volume 2年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0148547<br><br> <br><br>书目名称Advances in Intelligent Systems and Applications - Volume 2读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0148547<br><br> <br><br>书目名称Advances in Intelligent Systems and Applications - Volume 2读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0148547<br><br> <br><br>恃强凌弱 发表于 2025-3-21 21:23:10
A Dynamic Approach to Hash-Based Privacy-Preserving RFID Protocols,ctive adversary can not only track a tag via successful or unsuccessful identifications with legal or illegal readers but also perform a compromised attack. In . 2003, Weis et al. used the technique of the randomized hash lock to design a privacy-preserving protocol against such active adversaries.Mobile 发表于 2025-3-22 03:31:51
http://reply.papertrans.cn/15/1486/148547/148547_3.pngOverdose 发表于 2025-3-22 05:46:28
Cryptanalysis on the User Authentication Scheme with Anonymity,sers obtain services only after they are authenticated. Remote user authentication scheme provides the server a convenient way to authenticate users before they are allowed to access database and obtain services. For the sake of security, anonymity is an important requirement for some user authenticLament 发表于 2025-3-22 10:30:56
Deniable Authentication Protocols with Confidentiality and Anonymous Fair Protections, no non-interactive deniable authentication protocols are proposed to provide anonymity and fair protection both for senders and receivers. A noninteractive deniable authentication protocol with anonymity and fair protection is proposed to improve performance. Moreover, our protocol provides confide流眼泪 发表于 2025-3-22 13:02:03
http://reply.papertrans.cn/15/1486/148547/148547_6.pngFOVEA 发表于 2025-3-22 19:48:05
http://reply.papertrans.cn/15/1486/148547/148547_7.pngIn-Situ 发表于 2025-3-23 00:58:58
Impact of Identifier-Locator Split Mechanism on DDoS Attacks, hindering the development of current Internet. Therefore, the identifier-locator split mapping network which separates the identifier role and the locator role of an IP address has become one of the most-watched techniques in the field of future Internet architecture. However, DDoS attacks are stilATOPY 发表于 2025-3-23 03:45:24
Detecting Web-Based Botnets with Fast-Flux Domains, malicious transmissions in a vast amount of normal traffic that is not easily detectable. In addition, integrating with fast-flux domain technology, botnet may use a web server to issue attack commands and fast-flux technology to extend the lifespan of the malicious website. This study conducts ano玛瑙 发表于 2025-3-23 08:20:07
Improvements of Attack-Defense Trees for Threat Analysis,nt. Therefore, Protection Trees (PT) have been developed to migrate the system weaknesses against attacks. However, existing protection trees scheme provided a converse approach to counter against attacks, ignored the interactions between threats and defenses. Accordingly, the present study proposes