信任 发表于 2025-3-30 09:02:48
Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structureses generalized access structure. The scheme is useful for non-ideal access structures. For example, Stinson has identified eighteen possible non-isomorphic monotone access structures with four participants. Fourteen of them admit ideal and perfect secret sharing schemes. The remaining four cannLoathe 发表于 2025-3-30 12:41:57
An Approach to Cryptographic Key Exchange Using FingerprintIt consists of key generation, key storing and key sharing. A randomly generated long key (of 128, 190 or 256 bits) is difficult to remember. As a consequence, it is needed to be stored in a secured place. An additional authentication like knowledge or token based authentication is used to control tContracture 发表于 2025-3-30 18:05:44
http://reply.papertrans.cn/87/8636/863579/863579_53.png漂浮 发表于 2025-3-30 23:47:55
http://reply.papertrans.cn/87/8636/863579/863579_54.pngObvious 发表于 2025-3-31 04:04:00
Forensic Analysis for Monitoring Database Transactionsan be used to prevent illegitimate banking transactions. The banks deals in public money but unfortunately are becoming vulnerable by receiving illegal money in the form of legitimate business. The absence of any preventive measures in the banks to monitor such scam would be perilous some day. If thdebouch 发表于 2025-3-31 05:43:05
http://reply.papertrans.cn/87/8636/863579/863579_56.pngabduction 发表于 2025-3-31 11:12:41
http://reply.papertrans.cn/87/8636/863579/863579_57.png粗糙 发表于 2025-3-31 15:56:10
Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networksand Cooperative HBHAs. The proposed metrics proved effective in measuring the severity of both CBA and HBHAs. Simulation using Java in Time Simulator/Scalable Wireless Adhoc Network Simulator (JiST/SWANS) showed that Independent HBHA is the most severe attack compared to Cooperative HBHA and CBA. In残忍 发表于 2025-3-31 17:53:46
Peers Feedback and Compliance Based Trust Computation for Cloud Computingaking into account three different types of trust viz. interaction-based trust, compliance-based trust and recommendation-based trust. These types can be assigned appropriate weights to designate precedence among them in order to compute total trust. The model has been simulated using MATLAB. SimulaProvenance 发表于 2025-3-31 22:27:24
http://reply.papertrans.cn/87/8636/863579/863579_60.png