找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: E-Business and Telecommunications; 12th International J Mohammad S. Obaidat,Pascal Lorenz Conference proceedings 2016 Springer Internationa

[复制链接]
楼主: 愚蠢地活
发表于 2025-3-28 17:11:14 | 显示全部楼层
How Do the Multiple Tunable Receivers Per Node Affect the Efficiency of a WDM LAN? A Performance Ana employs a pre-transmission reservation scheme in order to improve the system output. Each station is equipped with a network interface with more than one tunable receivers in order to be able to receive more than one data packets during a time frame. As a results, the average probability of packet
发表于 2025-3-28 19:31:15 | 显示全部楼层
A Scalable Honeynet Architecture for Industrial Control Systemsed, there is no clear information regarding non-targeted attacks. In order to analyse potentially malicious behaviour, we develop a large-scale honeynet system to capture and investigate network activities that use industrial protocols. The honeynet is composed of multiple honeypots that can be auto
发表于 2025-3-28 23:58:20 | 显示全部楼层
发表于 2025-3-29 06:40:07 | 显示全部楼层
Automated Verification of e-Cash Protocolseet security and anonymity properties of e-cash. However, there are no general formal definitions that allow the automatic verification of e-cash protocols. In this paper, we propose a formal framework to define and verify security properties of e-cash protocols. To this end, we model e-cash protoco
发表于 2025-3-29 09:29:59 | 显示全部楼层
发表于 2025-3-29 14:01:44 | 显示全部楼层
发表于 2025-3-29 16:33:30 | 显示全部楼层
Execution Path Classification for Vulnerability Analysis and Detection bugs in applications’ source code. However, most of these tools are prone to non-negligible rates of false positives and false negatives, since they are designed to detect a priori specified types of bugs. Also, their analysis scalability to large programs is often an issue. To address these proble
发表于 2025-3-29 22:24:11 | 显示全部楼层
发表于 2025-3-30 00:25:09 | 显示全部楼层
Large Scale Evaluation of an Adaptive E-Advertising User Modeld and lightweight user model has been targeted, which should be easy to integrate into any existing system. A tool based on this model is introduced and a study that assesses the effectiveness of it via a trial run of a prototype of the tool with different users is described.
发表于 2025-3-30 07:23:33 | 显示全部楼层
Automated Verification of e-Cash Protocolsls in the applied .-calculus, and we formally define five relevant security properties. Finally, we validate our framework by analyzing, using the automatic tool ProVerif, four e-cash protocols: the online and the offline Chaum protocols, the Digicash protocol, and the protocol by Petersen and Poupard.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-22 11:36
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表