Nonporous 发表于 2025-3-26 20:56:38

http://reply.papertrans.cn/67/6628/662775/662775_31.png

CANT 发表于 2025-3-27 01:48:51

Analysis of Cloud Security and a Reliable Transmission Based on UDPing to the cloud computing system, this paper analyzes and summarizes it then presents a solution to the Cloud Security by a reliable transmission protocol based on UDP. It introduces the fundamental principle and emphasizes the confirming and retransmission mechanism. In the End, the paper analyzes

PON 发表于 2025-3-27 06:59:26

A Survey of Passive Image Forensicsapidly, tampering digital images without leaving any obvious traces becomes easier and easier. Passive image forensics is a technology of detecting image authenticity and source without relying on any pre-extraction or pre-embedded information. According to the forensics characteristics used by imag

裂口 发表于 2025-3-27 11:52:03

http://reply.papertrans.cn/67/6628/662775/662775_34.png

煞费苦心 发表于 2025-3-27 15:36:02

http://reply.papertrans.cn/67/6628/662775/662775_35.png

Tracheotomy 发表于 2025-3-27 20:14:47

http://reply.papertrans.cn/67/6628/662775/662775_36.png

性满足 发表于 2025-3-27 23:22:11

http://reply.papertrans.cn/67/6628/662775/662775_37.png

留恋 发表于 2025-3-28 03:58:51

Fine-Grain Trusted Storage and Transitivity Policy for Open Network Environment, which describes the trust-building processes from many ways. Fine-grain trusted storage structures are designed based on interaction ability and honesty capability, which are based on n history windows. On this condition, trusted transitivity tree based on honesty is studied, which enhances the ra

Wallow 发表于 2025-3-28 06:36:37

http://reply.papertrans.cn/67/6628/662775/662775_39.png

cruise 发表于 2025-3-28 10:45:19

http://reply.papertrans.cn/67/6628/662775/662775_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Network Computing and Information Security; Second International Jingsheng Lei,Fu Lee Wang,Yuan Luo Conference proceedings 2012 Springer-Ve