找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Mathematics and Computing; Third International Debasis Giri,Ram N. Mohapatra,Mohammad S. Obaidat Conference proceedings 2017 Springer Natu

[复制链接]
楼主: onychomycosis
发表于 2025-3-23 10:26:18 | 显示全部楼层
Study of Five-Neighborhood Linear Hybrid Cellular Automata and Their Synthesisdiffusion properties can be increased with the increase of the size of neighborhood radius of the CA cell. In this work, we study a class of 5-neighborhood null boundary linear CA. We present an algorithm for synthesizing 5-neighborhood linear CA from its characteristic polynomial by assuming that some of the CA sub-polynomials are available.
发表于 2025-3-23 14:43:56 | 显示全部楼层
发表于 2025-3-23 18:24:56 | 显示全部楼层
发表于 2025-3-24 00:39:59 | 显示全部楼层
Design of a Certificateless Designated Server Based Searchable Public Key Encryption Scheme which is indexed by important or related keyword(s) available in the data. Once the data is stored, the client supplies some keywords to the cloud server and requests the corresponding data. If the data is stored in plaintext form, data privacy will be violated. Thus the client encrypts the data al
发表于 2025-3-24 03:02:22 | 显示全部楼层
On the Security of a Searchable Anonymous Attribute Based Encryptioniated with secret key and the access policy connected with ciphertext matches. Although CP-ABE provides both confidentiality and fine-grained access control to the data stored in public cloud, anonymous CP-ABE adds interesting feature of sender and/or receiver anonymity. In this paper, we discuss a
发表于 2025-3-24 07:03:01 | 显示全部楼层
Security on “Secure Remote Login Scheme with Password and Smart Card Update Facilities”n scheme to access remote server over insecure channels. They also claimed that their scheme is able to resist various attacks. However, in this paper we demonstrate that Kumar et al. scheme is still vulnerable to various malicious attacks and is aslo unable to provide several essential security pro
发表于 2025-3-24 13:31:06 | 显示全部楼层
Design of Secure and Efficient Electronic Payment System for Mobile Usersfacilitate users, hand held devices such as a mobile phone application for the payment method should be accepted for practical implementation. Recently, Yang et al. proposed an electronic payment protocol using payment gateway and claims that this scheme is suitable for cloud computing, where paymen
发表于 2025-3-24 16:29:57 | 显示全部楼层
A Deep Learning Based Artificial Neural Network Approach for Intrusion Detectiont may reduce the utility of any network or systems. Constantly changing and the complicated nature of intrusion activities on computer networks cannot be dealt with IDSs that are currently operational. Identifying and preventing such attacks is one of the most challenging tasks. Deep Learning is one
发表于 2025-3-24 22:29:46 | 显示全部楼层
A Note on the Optimal Immunity of Boolean Functions Against Fast Algebraic Attacksriable Boolean function against fast algebraic attacks, one may need to compute the ranks of a series of matrices of size . over binary field . for each positive integer . less than . and corresponding .. In this paper, for an .-variable balanced Boolean function, exploiting the combinatorial proper
发表于 2025-3-25 00:58:26 | 显示全部楼层
Study of Five-Neighborhood Linear Hybrid Cellular Automata and Their Synthesis error-correcting codes, test pattern generation, cryptography etc. Most of these applications use 3-neighborhood one dimensional CA. Cellular automata have been chosen as a better crypto-primitives for providing very good pseudorandom sequences and their high diffusion property. The randomness and
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-30 03:11
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表