找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Innovative Security Solutions for Information Technology and Communications; 8th International Co Ion Bica,David Naccache,Emil Simion Confe

[复制链接]
楼主: SPIR
发表于 2025-3-28 17:22:56 | 显示全部楼层
发表于 2025-3-28 21:03:48 | 显示全部楼层
发表于 2025-3-29 01:32:20 | 显示全部楼层
Evaluation of Lightweight Block Ciphers for Embedded Systemsower devices which usually communicate through wireless connections. To avoid security and reliability problems, efficient cryptographic algorithms must be used for authentication, key exchange and message encryption. Due to the wide range of such algorithms and their characteristics, some ciphers a
发表于 2025-3-29 07:02:15 | 显示全部楼层
发表于 2025-3-29 08:00:44 | 显示全部楼层
A Novel Fast and Secure Chaos-Based Algorithm for Image Encryptione algorithm for image encryption scheme based on chaotic generators is proposed. In the proposed method, permutation-diffusion design is used to create computationally secure encryption primitives and the integer sequences obtained by the sorting of chaotic Logistic map generator by descending order
发表于 2025-3-29 12:20:14 | 显示全部楼层
Efficient Montgomery Multiplication on GPUste fields. Contemporary processors are not designed to support such operations in a productive manner, since most of them natively work on 8 to 64 bit word sizes. Thus, an expensive cryptographic accelerator is frequently required to offload the computational burden. In this paper, we focus on a hig
发表于 2025-3-29 17:32:07 | 显示全部楼层
发表于 2025-3-29 20:22:45 | 显示全部楼层
发表于 2025-3-30 03:11:00 | 显示全部楼层
A Cooperative Black Hole Node Detection and Mitigation Approach for MANETstion, researchers are working specifically on the security issues in MANETs, and many secure routing protocols/measures within the networks have been proposed. Our proposed work presents a more efficient approach for detecting the cooperative black hole attack in a MANET, which is particularly vulne
发表于 2025-3-30 07:19:47 | 显示全部楼层
Up-High to Down-Low: Applying Machine Learning to an Exploit Databasepe classifications is public exploit databases. Unfortunately, these databases contain only meta-data (high level or abstract data) of these exploits. Considering that classification depends on the raw measurements found in the field, these databases have been overlooked. In this study, we offer two
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-4 23:25
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表