BRUNT 发表于 2025-3-25 19:01:35
http://reply.papertrans.cn/47/4649/464845/464845_24.pngnarcissism 发表于 2025-3-25 21:19:36
New ID-Based Proxy Multi-signature from Pairingsin verification phase, the new scheme is more efficient in computational and timing sense than other available schemes. Moreover, the proposed scheme fulfills all the security requirements of a safe proxy signature.咯咯笑 发表于 2025-3-26 00:17:46
Knowledge Mobilization for e-Living: Horizontal and Vertical Networks for Development learning capacities and, potentially, sustained the communities that host them. The creation of internet-based networks has, furthermore, enabled knowledge to be mobilized between schools and their communities, thereby promoting new e-living possibilities.迫击炮 发表于 2025-3-26 06:45:42
Enhanced Authentication on Targeted Online Surveys: A Case of Online Course Evaluation Systementicity/validity, and respondent’s anonymity are among the issues that hinder the proliferation of online surveys..This paper addresses the aforementioned challenges and fills the left gap by improving previous works and later presents an online survey system which behaves well. The system considers also the problem of identity theft.清唱剧 发表于 2025-3-26 10:03:53
Possibilities of Modelling Web-Based Education Using IF-THEN Rules and Fuzzy Petri Nets in LMSn of fuzzy logic into Petri nets there arises a strong tool for modelling teaching processes, mainly thanks to the easy understandability and sophisticated mathematical setup, supporting a rather simple design of educational activities managed by LMS, for the compendious modularity of solution and robustness of the design.肥料 发表于 2025-3-26 14:46:03
Morphed Virus Family Classification Based on Opcodes Statistical Feature Using Decision Treey malware. In this research, we introduce and examine an opcodes statistical-based classifier using decision tree. This method is very simple in implementation. Our experimental outcome shows that different malware family executable files are classifiable using their opcodes statistical feature, with a high degree of reliability.ornithology 发表于 2025-3-26 20:35:41
On the Affine Ciphers in CryptographyAs soon as a commonly used monoalphabetic substitution cipher was broken, the word spread and that particular cryptosystem was useless. The affine cipher is simply a special case of the more general monoalphabetic substitution cipher. In this paper, we study the affine cipher and generalized affine cipher.forbid 发表于 2025-3-26 22:10:16
Authentication Tests Based on Distributed Temporal Protocol Logic for the Analysis of Security Protoogic (DTPL), and provide authentication tests at a higher level of abstraction. These tests can be easily applied on a variety of authentication protocols, yet they are rigorous enough to capture full capabilities of a typical Dolev-Yao intruder.枪支 发表于 2025-3-27 04:22:09
Conference proceedings 2011ion Science, ICIEIS 2011, held in Kuala Lumpur, Malaysia, in November 2011. The 210 revised full papers presented together with invited papers in the 4 volumes were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on e-learning, information secu条街道往前推 发表于 2025-3-27 08:38:51
http://reply.papertrans.cn/47/4649/464845/464845_33.png