谈判 发表于 2025-3-25 04:11:38
http://reply.papertrans.cn/64/6374/637397/637397_21.pngAGGER 发表于 2025-3-25 10:58:00
Improvements on Ant Routing for Sensor Networksorks by characteristics such as deeply embedded routers, highly dynamic networks, resource-constrained nodes, and unreliable and asymmetric links. Ant routing has shown good performance for communication networks; in this paper, we show why the existing ant-routing algorithms do not work well for seFILLY 发表于 2025-3-25 13:52:59
http://reply.papertrans.cn/64/6374/637397/637397_23.pngAggressive 发表于 2025-3-25 19:05:05
http://reply.papertrans.cn/64/6374/637397/637397_24.png破译 发表于 2025-3-25 23:44:14
http://reply.papertrans.cn/64/6374/637397/637397_25.png受人支配 发表于 2025-3-26 01:36:33
http://reply.papertrans.cn/64/6374/637397/637397_26.pngmitral-valve 发表于 2025-3-26 08:03:48
http://reply.papertrans.cn/64/6374/637397/637397_27.pngRingworm 发表于 2025-3-26 10:37:54
http://reply.papertrans.cn/64/6374/637397/637397_28.pngOrganonitrile 发表于 2025-3-26 14:16:36
http://reply.papertrans.cn/64/6374/637397/637397_29.pngAssignment 发表于 2025-3-26 17:16:35
https://doi.org/10.1007/978-3-031-63620-2roaches do not include position fields, so the server can replace the tampered data block with a healthy one to pass the audit phase. To overcome these issues, this paper introduces a new public data authentication scheme, ERPDA. The proposed technique incorporated a newly designed Merkle Tree (MT)