BROOK 发表于 2025-3-25 03:37:29

http://reply.papertrans.cn/25/2418/241745/241745_21.png

Locale 发表于 2025-3-25 11:05:19

http://reply.papertrans.cn/25/2418/241745/241745_22.png

谄媚于人 发表于 2025-3-25 12:00:20

http://reply.papertrans.cn/25/2418/241745/241745_23.png

fatty-acids 发表于 2025-3-25 16:38:38

http://reply.papertrans.cn/25/2418/241745/241745_24.png

Offset 发表于 2025-3-25 23:32:37

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/241745.jpg

overture 发表于 2025-3-26 03:54:10

http://reply.papertrans.cn/25/2418/241745/241745_26.png

反感 发表于 2025-3-26 04:21:30

http://reply.papertrans.cn/25/2418/241745/241745_27.png

大包裹 发表于 2025-3-26 10:22:05

http://reply.papertrans.cn/25/2418/241745/241745_28.png

CRP743 发表于 2025-3-26 14:44:03

Eulerian and Hamiltonian Graphs,We propose a method for stealthy, covert, fiber-optic communication. In this method, the power of the transmitted signal is spread and lowered below the noise level both in time as well as in frequency domains which makes the signal “invisible”. The method is also efficient in jamming avoidance.

NOMAD 发表于 2025-3-26 18:44:55

Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission,We propose a method for stealthy, covert, fiber-optic communication. In this method, the power of the transmitted signal is spread and lowered below the noise level both in time as well as in frequency domains which makes the signal “invisible”. The method is also efficient in jamming avoidance.
页: 1 2 [3] 4
查看完整版本: Titlebook: Cyber Security Cryptography and Machine Learning; Second International Itai Dinur,Shlomi Dolev,Sachin Lodha Conference proceedings 2018 Spr