有罪 发表于 2025-3-25 04:15:15

Ezendu Ariwa,Eyas El-QawasmehFast-track conference proceedings.State-of-the-art research.Up-to-date result

血统 发表于 2025-3-25 10:29:28

http://reply.papertrans.cn/28/2793/279277/279277_22.png

Boycott 发表于 2025-3-25 14:24:22

http://reply.papertrans.cn/28/2793/279277/279277_23.png

错误 发表于 2025-3-25 16:54:54

http://reply.papertrans.cn/28/2793/279277/279277_24.png

interlude 发表于 2025-3-25 22:32:54

http://reply.papertrans.cn/28/2793/279277/279277_25.png

上下倒置 发表于 2025-3-26 03:44:17

Privacy-Enhanced Deniable Authentication E-Mail Servicer, in some cases for strong privacy, a message sender will not want to let others know even the fact that he sent a message to a recipient. Very recently, Harn and Ren proposed a fully deniable authentication scheme for E-mail where a sender can repudiate his or her signature. In this paper, however

Esophagus 发表于 2025-3-26 06:46:54

http://reply.papertrans.cn/28/2793/279277/279277_27.png

范例 发表于 2025-3-26 11:13:54

Improving Hybrid Cryptosystems with DNA Steganographymands and needs for an extreme secure connection. An ideal security protocol should always be protecting the security of connections in many aspects, and leaves no trapdoor for the attackers. Nowadays, one of the popular cryptography protocols is hybrid cryptosystem that uses symmetric and public ke

MILL 发表于 2025-3-26 15:50:48

Data Hiding Method Based on DNA Basic Characteristicsof view. By utilizing some interesting features of DNA sequences, the implementation of a data hiding is applied. The algorithm which has been proposed here is based on binary coding and the complementary pair rules. Therefore, DNA reference sequence is chosen and also a secret message M is hidden i

铁砧 发表于 2025-3-26 19:51:13

http://reply.papertrans.cn/28/2793/279277/279277_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Digital Enterprise and Information Systems; International Confer Ezendu Ariwa,Eyas El-Qawasmeh Conference proceedings 2011 Springer-Verlag