intricacy 发表于 2025-3-30 11:33:22
http://reply.papertrans.cn/87/8635/863441/863441_51.pngPLIC 发表于 2025-3-30 14:17:07
An Effective Distance-Computing Method for Network Anomaly Detection,c using simple but effective distance-computing mechanism. Experimental results on the well-known KDD Cup 1999 dataset demonstrate it can effectively detect anomalies with high true positives, low false positives with acceptable computational cost.荨麻 发表于 2025-3-30 19:07:49
Using Agent in Virtual Machine for Interactive Security Training, This kind of interactivity as well as the individualized learning experience will decrease the disadvantage of “single size fit all” which is generally associated with traditional security training courses.Subjugate 发表于 2025-3-30 21:47:01
A Fast and Secure One-Way Hash Function,resistance. It is based on the standard secure hash function (SHA-1) algorithm. The analysis indicates that the proposed algorithm which we called (fSHA-1) is collision resistant and assures a good compression and pre-image resistance. In addition, the executing time compared with the standard secure hash function is much shorter.gangrene 发表于 2025-3-31 01:35:34
1865-0929 orea, in December 2011.The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of security technology.978-3-642-27188-5978-3-642-27189-2Series ISSN 1865-0929 Series E-ISSN 1865-0937BALK 发表于 2025-3-31 05:17:09
A Family Constructions of Odd-Variable Boolean Function with Optimum Algebraic Immunity,sed in cryptosystem should have high algebraic immunity. This paper generalizes Dalai’s and Chen’s constructions, and gets a new family constructions for odd-variable Boolean function with optimum algebraic immunity. By employing different transformations of Boolean functions, there would generate different constructions.Nefarious 发表于 2025-3-31 11:47:51
CLAPTCHA- A Novel Captcha,captcha. In this Claptcha, we have to find the English alphabets (alpha). Its efficiency is also proven here to be better than normal image based captchas or imagination captchas. Claptchas will be also more user friendly and enjoying.GRIEF 发表于 2025-3-31 16:22:47
An ID-Based Broadcast Signcryption Scheme Secure in the Standard Model,nd authenticated communications to several different receivers in the open channel. In this paper, we propose a concrete identity-based broadcast signcryption scheme in the standard model. The proposed scheme satisfies the message confidentiality and unforgeability.hypnogram 发表于 2025-3-31 21:30:11
Conference proceedings 2011rence, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, in December 2011.The papers presented were carefully reviewed and selected from numerous submissions and focuse on the various aspects of security technology.Abrupt 发表于 2025-3-31 22:50:31
Communications in Computer and Information Sciencehttp://image.papertrans.cn/s/image/863441.jpg