insidious 发表于 2025-3-26 22:24:16

On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP,on overload. We propose a practical method to determine an optimal . by taking account of both communication overload and computational efficiency under a given implementation environment to solve the ECDLP.

confide 发表于 2025-3-27 03:38:43

http://reply.papertrans.cn/87/8635/863443/863443_32.png

lobster 发表于 2025-3-27 05:47:47

http://reply.papertrans.cn/87/8635/863443/863443_33.png

疲惫的老马 发表于 2025-3-27 13:21:24

Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON,x Security Modules (LSM). Therefore, we determine the effect of introducing the secure OS on the performance of the OS, and a characteristic by the difference of the implementation method by using the overhead measurement tool, the LSM Performance Monitor (LSMPMON); the LSMPMON can be used to evaluate three different secure OSes.

Interim 发表于 2025-3-27 17:21:03

http://reply.papertrans.cn/87/8635/863443/863443_35.png

易碎 发表于 2025-3-27 19:17:08

http://reply.papertrans.cn/87/8635/863443/863443_36.png

DRILL 发表于 2025-3-27 22:56:55

An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection,tperforms Cox’s method in terms of imperceptibility, while keeping comparable robustness with the Cox’s method. Our proposed system achieves SNR (signal-to-noise ratio) values ranging from 20 dB to 28 dB, in contrast to Cox’s method which achieves SNR values ranging from only 14 dB to 23 dB.

Ptosis 发表于 2025-3-28 04:56:44

http://reply.papertrans.cn/87/8635/863443/863443_38.png

改变 发表于 2025-3-28 09:15:33

Histogram-Based Reversible Data Hiding with Quadtree Concepts,we take the concepts of quadtree decomposition into consideration to watch the characteristics of the original content. And we propose a reversible data hiding algorithm that has the ability to reside more capacity than conventional algorithm, with similar output image quality after embedding, and comparable side information produced.

garrulous 发表于 2025-3-28 12:02:44

http://reply.papertrans.cn/87/8635/863443/863443_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Security Technology, Disaster Recovery and Business Continuity; International Confer Tai-hoon Kim,Wai-chi Fang,Dominik Ślęzak Conference pr