Outwit 发表于 2025-3-28 18:35:32

Momoka Kasuya,Kazuo Sakiyamabehaviour of cracked fibre reinforced concrete under sustained load, investigating statically determinate and indeterminate test setups, fibre type (steel and polymer macro fibres) and fibre dosage. The duration of the creep tests ranges from less than 1 to 14 years. The following observations were

FLAX 发表于 2025-3-28 21:49:05

Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy, Revisitedh the communication is securely encrypted, the system can be exploited by malicious users if the attackers inject fault signal to the system and extract the user’s secret information. For this reason, we need to ensure the high performance encryption together with secure countermeasures against side

escalate 发表于 2025-3-28 23:54:18

Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networksmework to detect the manipulation of images through a contextual violation. First, we proposed a context learning convolutional neural networks (CL-CNN) that detects the contextual violation in the image. In combination with a well-known object detector such as R-CNN, the proposed method can evaluat

Neuralgia 发表于 2025-3-29 06:11:15

Robust 3D Mesh Watermarking Scheme for an Anti-Collusion Fingerprint Codecheme for an anti-collusion code. In contrast to the existing robust mesh watermarking which provides unsuitable primitives for anti-collusion code, the proposed method has well-operated capacity to carry the anti-collusion fingerprint code. In order to minimize the detection error, we also modeled

Vasodilation 发表于 2025-3-29 09:36:02

http://reply.papertrans.cn/47/4653/465297/465297_45.png

VICT 发表于 2025-3-29 11:49:24

http://reply.papertrans.cn/47/4653/465297/465297_46.png

ABIDE 发表于 2025-3-29 17:30:33

O,TR: Offline Off-the-Record (OTR) Messagingt applicable in some practical scenarios (e.g., when communication network became disconnected) because OTR requires both parties to be online at the same time. To address this limitation, we extend the conventional OTR into a new protocol named offline OTR (O.TR). O.TR makes the conversation partie

Contend 发表于 2025-3-29 20:33:34

ARM/NEON Co-design of Multiplication/Squaringn SISD are accelerated by re-writing the previous implementations in SIMD instruction sets. Particularly, integer multiplication and squaring operations are the most expensive in Public Key Cryptography (PKC). Many works have been conducted to reduce the execution timing in NEON instruction set. How

Mosaic 发表于 2025-3-30 02:21:20

http://reply.papertrans.cn/47/4653/465297/465297_49.png

PHAG 发表于 2025-3-30 04:35:42

Evolution of Spamming Attacks on Facebookrvice, over the past decades. Whereas, we have still been suffering from the attack though the service vendors as well as academia have been making best effort on winning such arms race. Such being the case, Facebook have also been inevitable to confront spamming campaign in order not to be overwhel
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Information Security Applications; 18th International C Brent ByungHoon Kang,Taesoo Kim Conference proceedings 2018 Springer International