Painstaking 发表于 2025-3-25 05:45:19

http://reply.papertrans.cn/15/1486/148547/148547_21.png

champaign 发表于 2025-3-25 10:56:25

http://reply.papertrans.cn/15/1486/148547/148547_22.png

前面 发表于 2025-3-25 14:52:36

http://reply.papertrans.cn/15/1486/148547/148547_23.png

空洞 发表于 2025-3-25 19:37:46

João J.M. Ferreira,Mário Raposo,Attila Vargaieves coordinated group allocation of resources combined with a larger number of group hosts designed to meet demand. The security server switching system uses server load balancing to prevent system failures, errors, and interruptions, accompanied with the ever so important theory of fault-tolerance for grace degradation purposes.

CULP 发表于 2025-3-25 21:53:41

A Novel Authentication Scheme Based on Torus Automorphism for Smart Card,recovered image should be the same as the photograph printed on the card. The combination of the image encryption using torus automorphism and secret sharing provides high security for the proposed authentication scheme.

patella 发表于 2025-3-26 02:25:05

http://reply.papertrans.cn/15/1486/148547/148547_26.png

野蛮 发表于 2025-3-26 04:20:05

Digital Watermarking Based on JND Model and QR Code Features, area QR Code embedded and add in invisible watermark and verify information for security propose..Experimental results showed that the proposed method performs better than the way that puts QR Code in the image without processing, we can not only hide QR Code into images but also the QR Code can be detected clearly.

CERE 发表于 2025-3-26 08:47:33

http://reply.papertrans.cn/15/1486/148547/148547_28.png

使出神 发表于 2025-3-26 13:10:38

Theoretical Analysis and Realistic Implementation of Secure Servers Switching System,ieves coordinated group allocation of resources combined with a larger number of group hosts designed to meet demand. The security server switching system uses server load balancing to prevent system failures, errors, and interruptions, accompanied with the ever so important theory of fault-tolerance for grace degradation purposes.

规范要多 发表于 2025-3-26 19:05:49

Incentives to Form Research Joint Ventures Igive their security proofs to support their claim. However, we find that their scheme is not as secure as the authors claimed. In this paper, we give comments on the paper of Choi et al. including the cryptanalysis of their scheme and the weakness of the security proof.
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Advances in Intelligent Systems and Applications - Volume 2; Proceedings of the I Jeng-Shyang Pan,Ching-Nung Yang,Chia-Chen Lin Conference