审问 发表于 2025-3-23 12:37:58
Adaptive and Secure Application Partitioning for Offloading in Mobile Cloud Computingation is necessary. In this paper we are proposing a secure partitioning of application so that the most sensitive or vulnerable part of the application can be kept in the mobile and rest of the application can be offloaded to the cloud.TRACE 发表于 2025-3-23 16:02:40
Secure and Privacy Preserving Biometric Authentication Using Watermarking Techniqueypt the watermarked biometric to protect its privacy from adversary. The watermarked biometric technique has been used for privacy preserving authentication purpose. The analysis proves the correctness, privacy and efficiency of our scheme.温顺 发表于 2025-3-23 19:09:48
A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Dis of visual data. There was a loss in pixel values due to the compression process. The implementation of the proposed approach was done successfully and analysis of the output results was done using MATLAB.范围广 发表于 2025-3-24 01:31:39
http://reply.papertrans.cn/87/8636/863581/863581_14.pngAutobiography 发表于 2025-3-24 04:43:06
http://reply.papertrans.cn/87/8636/863581/863581_15.pngBanister 发表于 2025-3-24 10:09:25
A Dynamic Multi-domain Access Control Model in Cloud Computingrought new challenges to access control technology. Direct at the existing problems of flexibility, timeliness and other aspects in multi-domain access control in the current cloud, on the basis of task driving idea, this paper put forward a dynamic access control policy. New method combined the advForehead-Lift 发表于 2025-3-24 11:39:26
http://reply.papertrans.cn/87/8636/863581/863581_17.png不合 发表于 2025-3-24 17:03:49
http://reply.papertrans.cn/87/8636/863581/863581_18.png神圣不可 发表于 2025-3-24 20:29:17
http://reply.papertrans.cn/87/8636/863581/863581_19.pngOrgasm 发表于 2025-3-25 00:54:19
http://reply.papertrans.cn/87/8636/863581/863581_20.png