TEM 发表于 2025-3-23 11:33:14

http://reply.papertrans.cn/19/1857/185683/185683_11.png

津贴 发表于 2025-3-23 16:48:48

Lightweight Identity Authentication Scheme Based on IBC Identity Cryptograph network resources, needing large storage resources and computing resources. Based on IBC identification cryptograph, this paper proposes a lightweight identity authentication scheme which uses SAKI private key distribution protocol and SM9 national secret algorithm. The scheme mainly includes three

锉屑 发表于 2025-3-23 20:47:02

http://reply.papertrans.cn/19/1857/185683/185683_13.png

不规则的跳动 发表于 2025-3-24 01:21:25

http://reply.papertrans.cn/19/1857/185683/185683_14.png

贿赂 发表于 2025-3-24 02:50:29

http://reply.papertrans.cn/19/1857/185683/185683_15.png

SLAY 发表于 2025-3-24 09:35:06

http://reply.papertrans.cn/19/1857/185683/185683_16.png

restrain 发表于 2025-3-24 13:45:56

Design and Optimization of Evaluation Metrics in Object Detection and Tracking for Low-Altitude Aerice and reconnaissance, while popular evaluation measures are sometimes not applicable for specific tasks. In order to evaluate visual object detection and tracking algorithms of low-altitude aerial video properly, we first summarize the evaluation basis of computer vision tasks, including ground tru

金桌活画面 发表于 2025-3-24 15:41:24

http://reply.papertrans.cn/19/1857/185683/185683_18.png

GULP 发表于 2025-3-24 19:13:28

1865-0929China, in December 2019.. .The 37 revised full papers and 12 short papers were carefully reviewed and selected out of 251 submissions. The papers included in this book cover topics in cybersecurity & privacy, big data, blockchain & internet of things, security in cloud and fog computing, and artifi

裂缝 发表于 2025-3-25 00:30:49

http://reply.papertrans.cn/19/1857/185683/185683_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Big Data and Security; First International Yuan Tian,Tinghuai Ma,Muhammad Khurram Khan Conference proceedings 2020 Springer Nature Singapo