恭维 发表于 2025-3-30 09:00:04
MoteAODV – An AODV Implementation for TinyOS 2.0ety of scenarios ranging from connecting powerful computers to connecting so-called “smart dust” devices. However, the core of MANET technology, the routing protocols, were never designed for the extremely low power devices that are desired for today’s applications. In this paper, we propose a new iBph773 发表于 2025-3-30 12:27:11
Random Number Generation Based on Fingerprintsnto key management and cryptography. Methods have been proposed that involve biometric-governed access to cryptographic keys, as well as methods that utilize biometric samples to derive keys for specialized encryption algorithms. The aim of this paper is to present a possible method for random numbeAura231 发表于 2025-3-30 16:34:25
Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Ceromoting electronic identification systems among their citizens to enable fully reliable identification. However, in today’s globalized environment, it is becoming more common for citizens and entities of a given country, with their own electronic credentials under the legal framework of their countrEmg827 发表于 2025-3-30 21:11:12
Fraud Detection for Voice over IP Services on Next-Generation Networksmmunications. These networks carry voice, data, and multimedia traffic over the Internet, providing users with the information they want in any format, amount, device, place or moment. Still, there are certain issues, such as the emerging security risks or the billing paradigms of the services offerAcetabulum 发表于 2025-3-31 03:50:40
http://reply.papertrans.cn/47/4654/465348/465348_55.png膝盖 发表于 2025-3-31 05:05:02
Can We Support Applications’ Evolution in Multi-application Smart Cards by Security-by-Contract?s smart cards have remained extremely rare because the business model of the asynchronous download and update of applications by different parties requires the control of interactions among possible applications . the card has been fielded. Yet the current security models and techniques do not suppoHIKE 发表于 2025-3-31 09:38:38
http://reply.papertrans.cn/47/4654/465348/465348_57.png按时间顺序 发表于 2025-3-31 13:26:12
Attribute-Based Encryption with Break-Glassng detailed, user-based policies in advance. This makes . in particular interesting for implementing security mechanisms in dynamic environments such as ubiquitous computing, disaster management, or health-care. For supporting the latter two application areas, common . approaches lack one important甜食 发表于 2025-3-31 19:31:12
http://reply.papertrans.cn/47/4654/465348/465348_59.png从属 发表于 2025-3-31 22:23:16
http://reply.papertrans.cn/47/4654/465348/465348_60.png