诱惑 发表于 2025-3-25 03:35:03
http://reply.papertrans.cn/47/4659/465896/465896_21.pngextemporaneous 发表于 2025-3-25 09:54:43
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain,rs to embed watermarks in images for various applications, evaluation of watermarking algorithms becomes more and more important. The degradation of watermarked images, which can be measured by signal to noise ratio (SNR) or peak signal to noise ratio (PSNR), is one of the major performance indexes发起 发表于 2025-3-25 14:39:52
http://reply.papertrans.cn/47/4659/465896/465896_23.png点燃 发表于 2025-3-25 16:57:55
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves, years. The problem of how to decrease the amount of addition and scalar multiplication on the Jacobians of hyperelliptic curves so that the implementation speed can be improved is very important for the practical use of HCC. In this paper, Using Frobenius endomorphism as a tool, we discuss the prob不知疲倦 发表于 2025-3-25 21:10:04
http://reply.papertrans.cn/47/4659/465896/465896_25.png容易做 发表于 2025-3-26 00:22:38
http://reply.papertrans.cn/47/4659/465896/465896_26.pnginsurrection 发表于 2025-3-26 04:20:56
A New Approach for Secure Multicast Routing in a Large Scale Network,henticated and receive/use proper capabilities when they join a multicast group so that illegal hosts or routers may not be able to expand the multicast delivery tree. Messages are encrypted with either a group data key or sender specific key that is shared by all members and changed efficiently whe成绩上升 发表于 2025-3-26 12:06:22
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database ncy for multilevel secure database. This protocol expended the twoway donation locking protocol in multilevel secure database, and eliminated unauthorized information flows. Altruistic locking has attempted to reduce delay effect associated with lock release moment by use of the idea of donation. AnCpap155 发表于 2025-3-26 12:48:24
Dealing with Uncertainties in Risk Analysis Using Belief Functions,that its result provides a decision-basis for safeguard implementation. However, it must often rely on speculation, educated guesses, incomplete data, and many unproven assumptions. Users of risk analysis often provide their uncertain subjective opinions as input values to risk analysis. Therefore,nuclear-tests 发表于 2025-3-26 19:05:36
RBAC for XML Document Stores,erged as an important standard in the area of information representation. XML documents can represent information at different levels of sensitivity. Access control for XML document stores must recognise the finegrained nature of the document structure. In this paper we present an approach to access