hermitage 发表于 2025-3-28 18:02:45

https://doi.org/10.1007/978-3-319-31875-2Application security; Cryptography; Cyber security; Hardware security; Network security; Black-box system

Nibble 发表于 2025-3-28 21:25:23

http://reply.papertrans.cn/47/4653/465284/465284_42.png

WATER 发表于 2025-3-29 00:39:33

Compact Implementations of LEA Block Cipher for Low-End Microprocessorsly, we achieved the fastest LEA implementations, which improves performance by 10.9 % than previous best known results. For size optimization, our implementation only occupies the 280. to conduct LEA encryption. After scaling, our implementation achieved the smallest ARX implementations so far, comp

ARM 发表于 2025-3-29 06:37:05

http://reply.papertrans.cn/47/4653/465284/465284_44.png

Allowance 发表于 2025-3-29 07:33:59

Wei He,Dirmanto Jap,Alexander Herrmann artists to be morecreative?  All are part of an interrelated wider society and enables artists to develop artwork fit for highly interfaced and conceptually broad contemporary contexts.  This is illustrated with examples which show exciting and challenging results...Creativity in Art, Design and Te

口诀 发表于 2025-3-29 12:31:24

http://reply.papertrans.cn/47/4653/465284/465284_46.png

进取心 发表于 2025-3-29 16:06:34

http://reply.papertrans.cn/47/4653/465284/465284_47.png

circuit 发表于 2025-3-29 20:39:30

Hyeokchan Kwon,Kwang-Il Lee,Gaeil An,Byung-Ho Chung,Jeong-Nyeo Kimirected to the departure stops; daily variations of districts population caused by the inter-district passengers’ flows; influence of the of competition on the municipal transport system operation; destination stops choice variants according to the stops’ attractiveness scores designed by experts.

掺假 发表于 2025-3-30 01:45:01

http://reply.papertrans.cn/47/4653/465284/465284_49.png

保守党 发表于 2025-3-30 04:02:42

You Sung Kang,Elizabeth O’Sullivan,Dooho Choi,Maire O’Neillof semantic technologies. As a result of the research, the authors come to the conclusion that under the conditions of formation of the information society there appears a possibility of reducing the role of a human in the process of company management by means of automation of managerial processes.
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Information Security Applications; 16th International W Ho-won Kim,Dooho Choi Conference proceedings 2016 Springer International Publishing