exigent 发表于 2025-3-23 09:45:55

http://reply.papertrans.cn/67/6629/662893/662893_11.png

scrape 发表于 2025-3-23 16:27:51

http://reply.papertrans.cn/67/6629/662893/662893_12.png

HEED 发表于 2025-3-23 19:36:17

http://reply.papertrans.cn/67/6629/662893/662893_13.png

certain 发表于 2025-3-23 22:23:03

978-3-319-46297-4Springer International Publishing AG 2016

宠爱 发表于 2025-3-24 03:01:39

Network and System Security978-3-319-46298-1Series ISSN 0302-9743 Series E-ISSN 1611-3349

Champion 发表于 2025-3-24 10:26:36

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/n/image/662893.jpg

PAN 发表于 2025-3-24 14:21:36

https://doi.org/10.1007/978-3-319-46298-1access control; authentication; cloud computing; computer crime; computer forensics; cryptography; data mi

原谅 发表于 2025-3-24 17:47:06

While Mobile Encounters with Cloudser the past few years. The convergence of mobile devices and clouds that leads to a brand new era of could-based mobile applications. It brings long-listed advantages for mobile users to get rid of the constraints of mobile devices (including limited mobile memory, data processing ability and batter

facilitate 发表于 2025-3-24 21:23:00

http://reply.papertrans.cn/67/6629/662893/662893_19.png

LATER 发表于 2025-3-25 01:19:29

http://reply.papertrans.cn/67/6629/662893/662893_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Network and System Security; 10th International C Jiageng Chen,Vincenzo Piuri,Moti Yung Conference proceedings 2016 Springer International