CK828 发表于 2025-3-21 16:04:46
书目名称Information Security Applications影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0465297<br><br> <br><br>书目名称Information Security Applications影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0465297<br><br> <br><br>书目名称Information Security Applications网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0465297<br><br> <br><br>书目名称Information Security Applications网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0465297<br><br> <br><br>书目名称Information Security Applications被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0465297<br><br> <br><br>书目名称Information Security Applications被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0465297<br><br> <br><br>书目名称Information Security Applications年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0465297<br><br> <br><br>书目名称Information Security Applications年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0465297<br><br> <br><br>书目名称Information Security Applications读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0465297<br><br> <br><br>书目名称Information Security Applications读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0465297<br><br> <br><br>走路左晃右晃 发表于 2025-3-21 21:34:37
http://reply.papertrans.cn/47/4653/465297/465297_2.pngfigure 发表于 2025-3-22 00:35:12
http://reply.papertrans.cn/47/4653/465297/465297_3.png可憎 发表于 2025-3-22 07:01:19
Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy, Revisited ARM–NEON, INTEL–SSE, INTEL–AVX2). The methods achieved the fault attack resistance with intra-instruction redundancy feature in SIMD instruction set. Finally, we applied the new fault attack countermeasures on the block cipher LEA and achieved the intra-instruction redundancy and high performance over modern ARM-NEON architectures.obstinate 发表于 2025-3-22 09:38:39
http://reply.papertrans.cn/47/4653/465297/465297_5.png彩色 发表于 2025-3-22 16:08:42
O,TR: Offline Off-the-Record (OTR) Messagingotype to support O.TR based on the Gajim XMMP instant messaging platform. Our experiments showed that O.TR can reliably be used when a network party is broken down. Moreover, O.TR provides an efficient session refreshment which is about . faster than the original OTR.磨碎 发表于 2025-3-22 17:29:56
Evolution of Spamming Attacks on Facebookmessenger. We study such the advanced spamming campaign so as to demystify how it has been worked and settled down on Facebook ecosystem. We build a crawler and analyser which collect 0.6 million of comments; afterwards, extracts the targeted spams. Our data shows that the spams are systematic, well-structured, obfuscated and even localized.frenzy 发表于 2025-3-22 23:51:04
http://reply.papertrans.cn/47/4653/465297/465297_8.pnginvade 发表于 2025-3-23 01:24:13
Glitch Recall: A Hardware Trojan Exploiting Natural Glitches in Logic Circuitsversary who triggered the hardware Trojan may infer multiple input values from a single output of the target logic, thereby obtaining multiple outputs of the preceding logics, by monitoring the existence of the natural glitches. We perform experiments and discuss the results and threats, not to be neglected, along with a possible mitigation.Creatinine-Test 发表于 2025-3-23 06:53:42
Robust 3D Mesh Watermarking Scheme for an Anti-Collusion Fingerprint Codethe response of the detector and herein present optimized thresholds for our method. Based on the experiments, the proposed method outperformed conventional robust mesh watermarking against collusion attack in all cases.