TEM 发表于 2025-3-23 11:33:14
http://reply.papertrans.cn/19/1857/185683/185683_11.png津贴 发表于 2025-3-23 16:48:48
Lightweight Identity Authentication Scheme Based on IBC Identity Cryptograph network resources, needing large storage resources and computing resources. Based on IBC identification cryptograph, this paper proposes a lightweight identity authentication scheme which uses SAKI private key distribution protocol and SM9 national secret algorithm. The scheme mainly includes three锉屑 发表于 2025-3-23 20:47:02
http://reply.papertrans.cn/19/1857/185683/185683_13.png不规则的跳动 发表于 2025-3-24 01:21:25
http://reply.papertrans.cn/19/1857/185683/185683_14.png贿赂 发表于 2025-3-24 02:50:29
http://reply.papertrans.cn/19/1857/185683/185683_15.pngSLAY 发表于 2025-3-24 09:35:06
http://reply.papertrans.cn/19/1857/185683/185683_16.pngrestrain 发表于 2025-3-24 13:45:56
Design and Optimization of Evaluation Metrics in Object Detection and Tracking for Low-Altitude Aerice and reconnaissance, while popular evaluation measures are sometimes not applicable for specific tasks. In order to evaluate visual object detection and tracking algorithms of low-altitude aerial video properly, we first summarize the evaluation basis of computer vision tasks, including ground tru金桌活画面 发表于 2025-3-24 15:41:24
http://reply.papertrans.cn/19/1857/185683/185683_18.pngGULP 发表于 2025-3-24 19:13:28
1865-0929China, in December 2019.. .The 37 revised full papers and 12 short papers were carefully reviewed and selected out of 251 submissions. The papers included in this book cover topics in cybersecurity & privacy, big data, blockchain & internet of things, security in cloud and fog computing, and artifi裂缝 发表于 2025-3-25 00:30:49
http://reply.papertrans.cn/19/1857/185683/185683_20.png