信任 发表于 2025-3-30 09:02:48

Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structureses generalized access structure. The scheme is useful for non-ideal access structures. For example, Stinson has identified eighteen possible non-isomorphic monotone access structures with four participants. Fourteen of them admit ideal and perfect secret sharing schemes. The remaining four cann

Loathe 发表于 2025-3-30 12:41:57

An Approach to Cryptographic Key Exchange Using FingerprintIt consists of key generation, key storing and key sharing. A randomly generated long key (of 128, 190 or 256 bits) is difficult to remember. As a consequence, it is needed to be stored in a secured place. An additional authentication like knowledge or token based authentication is used to control t

Contracture 发表于 2025-3-30 18:05:44

http://reply.papertrans.cn/87/8636/863579/863579_53.png

漂浮 发表于 2025-3-30 23:47:55

http://reply.papertrans.cn/87/8636/863579/863579_54.png

Obvious 发表于 2025-3-31 04:04:00

Forensic Analysis for Monitoring Database Transactionsan be used to prevent illegitimate banking transactions. The banks deals in public money but unfortunately are becoming vulnerable by receiving illegal money in the form of legitimate business. The absence of any preventive measures in the banks to monitor such scam would be perilous some day. If th

debouch 发表于 2025-3-31 05:43:05

http://reply.papertrans.cn/87/8636/863579/863579_56.png

abduction 发表于 2025-3-31 11:12:41

http://reply.papertrans.cn/87/8636/863579/863579_57.png

粗糙 发表于 2025-3-31 15:56:10

Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networksand Cooperative HBHAs. The proposed metrics proved effective in measuring the severity of both CBA and HBHAs. Simulation using Java in Time Simulator/Scalable Wireless Adhoc Network Simulator (JiST/SWANS) showed that Independent HBHA is the most severe attack compared to Cooperative HBHA and CBA. In

残忍 发表于 2025-3-31 17:53:46

Peers Feedback and Compliance Based Trust Computation for Cloud Computingaking into account three different types of trust viz. interaction-based trust, compliance-based trust and recommendation-based trust. These types can be assigned appropriate weights to designate precedence among them in order to compute total trust. The model has been simulated using MATLAB. Simula

Provenance 发表于 2025-3-31 22:27:24

http://reply.papertrans.cn/87/8636/863579/863579_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Security in Computing and Communications; Second International Jaime Lloret Mauri,Sabu M. Thampi,Di Jin Conference proceedings 2014 Springe