复习 发表于 2025-3-25 03:54:09

Secure Leader Election Algorithm Optimized for Power Saving Using Mobile Agents for Intrusion Detect electing the most cost- efficient node. We will call it leader-IDS. Our contribution to the election scheme is to design an algorithm which uses mobile agents to gather resource information from all the cluster nodes and use it to elect leader in optimum and secure manner.

Hiatal-Hernia 发表于 2025-3-25 07:34:18

Towards Constructing a Trustworthy Internet: Privacy-Aware Transfer of Digital Identity Document inbound to XML-based digital identity document. We explain that the forwarding engine verifies the validity of digital identity document transmission on the basis of identity contract terms. Three use cases are presented to detail the proposed approach with the corresponding UML sequence diagrams.

大炮 发表于 2025-3-25 14:56:11

Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Usiny management protocol design for simultaneous multiple groups. The proposed scheme achieves significant reduction in rekeying cost, storage compared to these schemes. Interestingly, we achieve this efficiency in the rekeying cost without much increase in storage at user.

注意 发表于 2025-3-25 16:00:51

Effective Implementation of DES Algorithm for Voice Scramblingurage eavesdropping from co-channel users or RF scanners. The DES design is implemented on Virtex 5 XC5VLX110T Field Programming Gate Arrays (FPGA) technology. Final 16-stage pipelined design is achieved with encryption rate of 35.5 Gbit/s and 2140 number of Configurable logic blocks (CLBs).

预测 发表于 2025-3-25 23:31:59

Multilingual Speaker Identification with the Constraint of Limited Data Using Multitaper MFCCtracted and modeled using Gaussian Mixture Model (GMM)-Universal Background Model (UBM). The results show that the multitaper MFCC approach performs better than the conventional Hamming window MFCC technique in all the speaker identification experiments.

Pastry 发表于 2025-3-26 02:11:10

http://reply.papertrans.cn/83/8235/823417/823417_26.png

装入胶囊 发表于 2025-3-26 06:12:26

1865-0929 nal Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012. The 34 revised full papers and 8 poster presentations were carefully reviewed and selected from 112 submissions. The papers cover various topics in Computer Networks and

奇思怪想 发表于 2025-3-26 10:34:17

http://reply.papertrans.cn/83/8235/823417/823417_28.png

放逐 发表于 2025-3-26 14:04:23

http://reply.papertrans.cn/83/8235/823417/823417_29.png

Hyperalgesia 发表于 2025-3-26 17:05:48

Imperceptible Image Indexing Using Digital Watermarkingodifications to such pixel will not attract the attention of human eyes. Watermark is thus integrated imperceptibly into the digital images. The proposed is a scheme for embedding a unique index number as watermark for content tracking and identification.
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Recent Trends in Computer Networks and Distributed Systems Security; International Confer Sabu M. Thampi,Albert Y. Zomaya,Tony Thomas Confe