找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Materials for Construction and Civil Engineering; Science, Processing, M. Clara Gonçalves,Fernanda Margarido Book 2015 Springer Internation

[复制链接]
楼主: Nonchalant
发表于 2025-3-23 12:27:21 | 显示全部楼层
José Neves,António Correia Diogo,Luís de Picado Santosed by Chen in 1994, it is defined in two different types; an oblivious signature with . messages and, an oblivious signature with . keys. In an oblivious signature with . messages, it allows a signature requester to get a signature on 1-out-of-. messages while during the signing process, the signer
发表于 2025-3-23 14:54:48 | 显示全部楼层
Rogério Colaçobe vulnerable to security threats affecting DNS servers or exploiting the DNS protocol. In this paper, we address DNS protocol exploitation that causes data breaches via DNS tunneling, where an attacker employs techniques to exfiltrate sensitive data from a victim network. This usually happens by br
发表于 2025-3-23 21:19:21 | 显示全部楼层
发表于 2025-3-24 01:47:46 | 显示全部楼层
M. Clara Gonçalvess scenario may expose a good chance for cybercriminals to launch charging attacks and steal user’s private information. Juice filming charging (JFC) attack is one example, which can steal users’ sensitive information from both Android OS and iOS devices, through automatically recording phone-screen
发表于 2025-3-24 04:34:27 | 显示全部楼层
Pedro Miguel Amaral,Jorge C. Fernandes,Vera Pires,Luis Guerra Rosabe vulnerable to security threats affecting DNS servers or exploiting the DNS protocol. In this paper, we address DNS protocol exploitation that causes data breaches via DNS tunneling, where an attacker employs techniques to exfiltrate sensitive data from a victim network. This usually happens by br
发表于 2025-3-24 10:25:58 | 显示全部楼层
发表于 2025-3-24 12:15:25 | 显示全部楼层
发表于 2025-3-24 16:46:23 | 显示全部楼层
Helena Cruz,Dennis Jones,Lina Nunesorganizations in social networks in huge quantities. One of the most important non-resolved topics is the Fake News propagation problem. Fake news propagates because of several reasons, one of which is non-trustworthy users. These users, some with malicious intentions, and some with low social media
发表于 2025-3-24 19:33:21 | 显示全部楼层
发表于 2025-3-25 01:20:44 | 显示全部楼层
M. Clara Gonçalves for facilitating the adoption of edge computing.Gives multi.This book provides a hands-on experience in software and hardware engineering of IoT devices in edge and cloud computing systems, by putting in practice state-of-the-art concepts of hardware devices, networking and computing software. It p
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-7-5 16:34
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表