Affluence 发表于 2025-3-28 17:31:44

http://reply.papertrans.cn/15/1497/149638/149638_41.png

Constant 发表于 2025-3-28 20:03:03

Vishal Raul,Leifur Leifsson,Slawomir Kozielthe problem of determining the scope and construction sequence of a software, but most of them lack ease of use from the developer’s perspective. In this paper, we present an approach to determine software construction sequences which emphasizes easiness from the developers’ point of view and a cont

STEER 发表于 2025-3-29 00:04:51

http://reply.papertrans.cn/15/1497/149638/149638_43.png

theta-waves 发表于 2025-3-29 04:02:35

Thomas McSweeney,Neil Walton,Mawussi Zounon image file keeping two considerations in mind which are Size and Degree of Security. At the source, the image which is to be hidden (target image) is encoded at the end of another image (cover image). Double layer security of the hidden image can be achieved (over the untrusted network) by; firstly

Amorous 发表于 2025-3-29 08:27:19

https://doi.org/10.1007/978-3-642-10240-0access control; biometrics; cognition; communication; cryptanalysis; data hiding; e-government; iris recogn

无节奏 发表于 2025-3-29 14:17:48

978-3-642-10239-4Springer-Verlag Berlin Heidelberg 2009

同谋 发表于 2025-3-29 19:09:57

http://reply.papertrans.cn/15/1497/149638/149638_47.png

吞下 发表于 2025-3-29 20:44:43

1865-0929 Overview: 978-3-642-10239-4978-3-642-10240-0Series ISSN 1865-0929 Series E-ISSN 1865-0937

显示 发表于 2025-3-30 00:55:10

http://reply.papertrans.cn/15/1497/149638/149638_49.png

Thyroiditis 发表于 2025-3-30 06:46:44

Andrzej Bielecki,Maciej GierdziewiczIn 2007, Wen . proposed a novel elliptic curve dynamic access control system. In this paper, we will show that the scheme is vulnerable to various attacks.
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Advances in Security Technology; International Confer Haeng-kon Kim,Tai-hoon Kim,Akingbehin Kiumi Conference proceedings 2009 Springer-Verl