因无茶而冷淡 发表于 2025-3-28 17:18:34
Impact of Nepotism on the Human Resources Component of ERP Systems Implementation in Lebanonis adopted variance-based structural equation modelling technique. The results of the study indicate that nepotism significantly impacts the human resources component of ERP systems implementation success. Such systems can be more effectively implemented in firms with an organizational culture that does not nurture nepotism.课程 发表于 2025-3-28 19:42:54
Security Analysis and Improvement on Kerberos Authentication Protocolf to eliminate the hidden trouble caused by using plaintext when Kerberos-clients first interact with AS. Then we apply Kerberos in the SSL handshake protocol in order to test the performance of improved Kerberos. The experimental results show that the scheme effectively improves the authentication performance of Kerberos.ORE 发表于 2025-3-28 23:55:06
http://reply.papertrans.cn/19/1857/185683/185683_43.png无瑕疵 发表于 2025-3-29 04:12:45
An Improved Dynamic Certificateless Authenticated Asymmetric Group Key Agreement Protocol with Trust forward secrecy. We then proposed an improved dynamic certificateless AAGKA protocol. Security proofs show that our protocol can provide security attributes including secrecy, known-key security, key compromise impersonation resistance, forward security, non-repudiation, and privacy. Furthermore, the proposed protocol is still efficient.会犯错误 发表于 2025-3-29 11:14:54
http://reply.papertrans.cn/19/1857/185683/185683_45.png压碎 发表于 2025-3-29 12:25:18
http://reply.papertrans.cn/19/1857/185683/185683_46.pngharmony 发表于 2025-3-29 18:23:03
Semiparametric Models and Efficiencyed by the existing lattice-based IBE schemes from LWE. Its storage cost is also lower. We show that our IBE scheme is semantically secure against an adaptive chosen plaintext attack (CPA) from all probabilistic polynomial time adversaries in the random oracle model.冲突 发表于 2025-3-29 21:43:19
http://reply.papertrans.cn/19/1857/185683/185683_48.png寒冷 发表于 2025-3-30 03:34:34
http://reply.papertrans.cn/19/1857/185683/185683_49.pngDedication 发表于 2025-3-30 04:14:58
https://doi.org/10.1007/978-981-15-7530-3artificial intelligence; communication systems; computer hardware; computer networks; computer security;