合群 发表于 2025-3-23 12:14:29

http://reply.papertrans.cn/24/2306/230523/230523_11.png

冥想后 发表于 2025-3-23 15:00:00

http://reply.papertrans.cn/24/2306/230523/230523_12.png

BILL 发表于 2025-3-23 22:07:16

How to Specify Security Services: A Practical Approachages of system development. Security is only added latter as an afterthought in function of other factors such as the environment into which the system is to be inserted, legal requirements, and other kinds of constraints. In this work we introduce a methodology for the specification of security req

LIMIT 发表于 2025-3-23 22:42:47

http://reply.papertrans.cn/24/2306/230523/230523_14.png

神圣不可 发表于 2025-3-24 04:36:31

http://reply.papertrans.cn/24/2306/230523/230523_15.png

热情的我 发表于 2025-3-24 07:20:00

http://reply.papertrans.cn/24/2306/230523/230523_16.png

毁坏 发表于 2025-3-24 11:40:21

Watermark Security via Secret Wavelet Packet Subband Structuresructures to create a secret wavelet domain and discuss how this idea can be used to improve the security of watermarking schemes. Two methods to create random wavelet packet trees are discussed and analyzed. The security against unauthorized detection is investigated. Using JPEG and JPEG2000 compres

SOBER 发表于 2025-3-24 15:22:11

http://reply.papertrans.cn/24/2306/230523/230523_18.png

死亡 发表于 2025-3-24 22:30:35

http://reply.papertrans.cn/24/2306/230523/230523_19.png

是他笨 发表于 2025-3-25 00:57:14

Ees Ahmad,Pawan K. Sharma,Mohd Saghir Khantication protocol for the platforms involved, a mobile agent authenticator, and a method for generation of protection domains. It is based on SPKI/SDSI chains of trust, and takes advantage of the flexibility of the SPKI/SDSI certificate delegation infrastructure to provide decentralized authorization and authentication control.
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Communications and Multimedia Security. Advanced Techniques for Network and Data Protection; 7th IFIP TC-6 TC-11 Antonio Lioy,Daniele Mazz