枕垫 发表于 2025-3-25 05:05:55

2194-5357 ts both theory and applications.This three volume book contains the Proceedings of 5th International Conference on Advanced Computing, Networking and Informatics (ICACNI 2017). The book focuses on the recent advancement of the broad areas of advanced computing, networking and informatics. It also in

ectropion 发表于 2025-3-25 11:04:08

Windows Physical Memory Analysis to Detect the Presence of Malicious Codetry key, user authentication details with forensic importance. The cyber attacker modifies the code of the legitimate process to achieve malicious tasks and such malicious codes are not detected by the antivirus program. In order to detect the presence of malicious codes in the legitimate process, t

separate 发表于 2025-3-25 13:51:56

Signcrypting the Group Signature with Non-transitive Proxy Re-encryption in VANETonal digital signature with encryption is very expensive as it requires massive computational overheads. Instead signcryption combines these two into one step, and overhead reduced is significantly observable. Proxy re-encryption is a technique in which a proxy enables a third person Chris to be abl

蒸发 发表于 2025-3-25 18:59:40

http://reply.papertrans.cn/83/8233/823270/823270_24.png

无底 发表于 2025-3-25 21:42:07

http://reply.papertrans.cn/83/8233/823270/823270_25.png

PALMY 发表于 2025-3-26 02:19:49

Dual-Core Implementation of Right-to-Left Modular Exponentiatione performance of public-key cryptographic transformations is strongly influenced by the competent implementation of modular exponentiation and modular multiplication. This paper presents the hardware implementation of modular exponentiation on two processor cores. Montgomery multiplication method is

心痛 发表于 2025-3-26 04:45:00

Investigation of Privacy Issues in Location-Based Servicesens GIS 2:398–404, 2013 [.]). Users of LBS exchange information based on location like maps and navigation, location-based information, location tracking services, social networking, vehicular direction finding, and location-based advertisement. LBS users’ provide highly personalize information to t

ABOUT 发表于 2025-3-26 11:19:07

Forensic Implications of Cortana Application in Windows 10fied by “Ask me anything” text box at the Start Menu and can be used for a number of tasks such as setting up reminders based on time, place, and person; searching stuff on local device or web; sending emails and texts; and more. The feature keeps track of reminders when and where they got finalized

Diatribe 发表于 2025-3-26 15:06:56

http://reply.papertrans.cn/83/8233/823270/823270_29.png

rectum 发表于 2025-3-26 20:12:16

http://reply.papertrans.cn/83/8233/823270/823270_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Recent Findings in Intelligent Computing Techniques; Proceedings of the 5 Pankaj Kumar Sa,Sambit Bakshi,Manmath Narayan Saho Conference pro