Militia 发表于 2025-3-23 12:21:43

http://reply.papertrans.cn/47/4655/465489/465489_11.png

暂停,间歇 发表于 2025-3-23 13:58:20

http://reply.papertrans.cn/47/4655/465489/465489_12.png

sacrum 发表于 2025-3-23 18:33:20

http://reply.papertrans.cn/47/4655/465489/465489_13.png

flaunt 发表于 2025-3-24 02:10:47

http://reply.papertrans.cn/47/4655/465489/465489_14.png

狂热文化 发表于 2025-3-24 06:05:56

Dolphin Swarm Algorithm for Cryptanalysis,utions with higher fitness in a shorter period of time and with fewer individuals. The DSA can also be used to attack other block ciphers like Advanced Encryption Standard or Elliptic Curve Cryptography due to the independence of the fitness function with respect to the cipher.

迫击炮 发表于 2025-3-24 08:21:26

A Secured Communication Model for IoT,ternet, the major concern arises around the security aspects of IoT. In this paper, we address a publish/subscribe security model for IoT which can usefully contribute to secured communications on IoT.

厚颜无耻 发表于 2025-3-24 11:28:10

http://reply.papertrans.cn/47/4655/465489/465489_17.png

减弱不好 发表于 2025-3-24 18:06:56

http://reply.papertrans.cn/47/4655/465489/465489_18.png

松软 发表于 2025-3-24 19:48:19

Advances in Intelligent Systems and Computinghttp://image.papertrans.cn/i/image/465489.jpg

Addictive 发表于 2025-3-25 02:15:59

https://doi.org/10.1007/978-981-13-3338-5Bio-informatics; Business Intelligence; Communication Technology; INDIA; INDIA Proceedings; Image Process
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Information Systems Design and Intelligent Applications; Proceedings of Fifth Suresh Chandra Satapathy,Vikrant Bhateja,Roman Sen Conference