Enteropathic 发表于 2025-3-27 00:00:11

Cryptographic Analysis of a Type of Sequence Generatorsam ciphers). Certain cryptographic parameters such as maximum period or linear span are obtained for the generated sequences, while estimations for autocorrelation and cross-correlation of such sequences are presented too. Several remarks regarding the non convenience of such generators for cryptographic or CDMA applications are also stated.

debacle 发表于 2025-3-27 02:47:57

http://reply.papertrans.cn/47/4656/465541/465541_32.png

Narrative 发表于 2025-3-27 08:46:27

http://reply.papertrans.cn/47/4656/465541/465541_33.png

出血 发表于 2025-3-27 12:37:17

http://reply.papertrans.cn/47/4656/465541/465541_34.png

Defraud 发表于 2025-3-27 14:42:02

http://reply.papertrans.cn/47/4656/465541/465541_35.png

剥削 发表于 2025-3-27 18:31:54

http://reply.papertrans.cn/47/4656/465541/465541_36.png

Density 发表于 2025-3-28 01:26:48

Defence against Wormhole Attacks in Wireless Mesh Networkssk graph model which defines necessary and sufficient condition for a secure path. WDM is resistant against hidden and exposed wormhole attacks, and does not rely on any extra hardware like global positioning system, time or connectivity information.

使闭塞 发表于 2025-3-28 05:56:44

: A Trust Access Control Model in Multi-Organization Environmentsists in defining two dynamic trust vectors: one for the organizations and one for users which are based on different parameters such as knowledge, reputation and experience. Finally, we illustrate the use of . with a case study.

Antecedent 发表于 2025-3-28 07:59:37

http://reply.papertrans.cn/47/4656/465541/465541_39.png

muster 发表于 2025-3-28 11:14:10

http://reply.papertrans.cn/47/4656/465541/465541_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information Systems Security; 8th International Co Venkat Venkatakrishnan,Diganta Goswami Conference proceedings 2012 Springer-Verlag Berli