Mammal 发表于 2025-3-23 12:21:51

Approach to Methods of Network Services Exploitation,atures defined by the type of business service realized. The dependability means the combination of the reliability and functional parameters of the network. We try to analyze two types of sophisticated systems: discrete transport systems and the computer networks. The proposed method is based on mo

instill 发表于 2025-3-23 16:11:29

Pattern Based Support for Site Certification,alled Site Certification. The methodology is based on design patterns worked out in the CCMODE project (Common Criteria compliant, Modular, Open IT security Development Environment) carried out by the Institute of Innovative Technologies EMAG. The design patterns help developers to write proper docu

现晕光 发表于 2025-3-23 18:06:26

http://reply.papertrans.cn/24/2316/231577/231577_13.png

投票 发表于 2025-3-23 22:44:07

http://reply.papertrans.cn/24/2316/231577/231577_14.png

monogamy 发表于 2025-3-24 04:56:27

Formal Methods Supporting Agent Aided Smart Lighting Design,t system controlling the distribution and work parameters of lighting points distributed across a given urban area. The cooperation and behavior of sensor agents are modeled and verified using Alvis modeling language.

反抗者 发表于 2025-3-24 09:52:10

http://reply.papertrans.cn/24/2316/231577/231577_16.png

中和 发表于 2025-3-24 14:14:18

http://reply.papertrans.cn/24/2316/231577/231577_17.png

噱头 发表于 2025-3-24 14:57:57

Implementing AES and Serpent Ciphers in New Generation of Low-Cost FPGA Devices,ementation of contemporary ciphers. This work presents implementations of the two best algorithms of the AES contest – Rijndael and Serpent – in Spartan-6 devices from Xilinx and compares them with equivalent effects that were obtained in architectures of the previous generation. The included result

怒目而视 发表于 2025-3-24 21:58:38

http://reply.papertrans.cn/24/2316/231577/231577_19.png

赦免 发表于 2025-3-25 00:48:29

https://doi.org/10.1007/978-3-658-09261-0tential applications in all cryptographic protocols based on the .-out-of-. oblivious transfer using probabilistic encryption including generalized oblivious transfer, in particular in electronic commerce.
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Complex Systems and Dependability; Wojciech Zamojski,Jacek Mazurkiewicz,Janusz Kacprz Conference proceedings 2012 Springer-Verlag Berlin H