找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Advances in Security Technology; International Confer Haeng-kon Kim,Tai-hoon Kim,Akingbehin Kiumi Conference proceedings 2009 Springer-Verl

[复制链接]
楼主: 鸟场
发表于 2025-3-25 05:31:56 | 显示全部楼层
Bidirectional Quantum Secure Direct Communication Based on Entanglement,es have been imposed on high-dimensional Bell states via the local unitary operations with superdense coding. Security analysis indicates that this scheme is secure against the present Trojan horse attack and the current attack strategyand it can also ensure the security of the messages in a low noisy channel.
发表于 2025-3-25 11:19:07 | 显示全部楼层
发表于 2025-3-25 12:37:08 | 显示全部楼层
发表于 2025-3-25 18:58:45 | 显示全部楼层
Evaluating the Applicability of a Use Case Precedence Diagram Based Approach in Software Developmenrolled experiment based on this approach with professionals who have had at least two years of experience in software projects. The results obtained from this experiment show that our approach enables developers to define construction sequences more precisely than with other ad-hoc techniques.
发表于 2025-3-25 22:28:17 | 显示全部楼层
A Secured Technique for Image Data Hiding,, the starting point of encoding the image data is depended on the size of the images and it is stored within the encoded image at the end of its header information as a cipher text.; secondly, the target image is hidden behind the cover image by following our encrypted image hiding technique.
发表于 2025-3-26 02:15:14 | 显示全部楼层
Ahmad Abdelfattah,Stan Tomov,Jack Dongarrasy spam reporter”. This module enables victims to report spam contents to the administrator directly. The reported contents and information, of course, are shared with other domains as a black list. Through the experimental result, we showed this system is enough to prevent, detect, and block VoIP spam.
发表于 2025-3-26 06:58:13 | 显示全部楼层
Vladislava Churuksaeva,Alexander Starchenkoy an individual by comparing the feature obtained from the feature extraction algorithm with the previously stored feature by producing a similarity score. This score will be indicating the degree of similarity between a pair of biometrics data under consideration. Depending on degree of similarity, individual can be identified.
发表于 2025-3-26 12:01:59 | 显示全部楼层
发表于 2025-3-26 16:14:32 | 显示全部楼层
发表于 2025-3-26 16:48:11 | 显示全部楼层
Andrey Epikhin,Matvey Kraposhinross-layered permission assignment is devised based on some popular information security models such as RBAC, DTE and etc. And a corresponding prototype system is implemented based on Linux. Finally, some preliminary test results are analyzed and further research directions are pointed out.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-13 19:53
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表