找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Recent Trends in Computer Networks and Distributed Systems Security; International Confer Sabu M. Thampi,Albert Y. Zomaya,Tony Thomas Confe

[复制链接]
楼主: intrinsic
发表于 2025-3-25 03:54:09 | 显示全部楼层
Secure Leader Election Algorithm Optimized for Power Saving Using Mobile Agents for Intrusion Detect electing the most cost- efficient node. We will call it leader-IDS. Our contribution to the election scheme is to design an algorithm which uses mobile agents to gather resource information from all the cluster nodes and use it to elect leader in optimum and secure manner.
发表于 2025-3-25 07:34:18 | 显示全部楼层
Towards Constructing a Trustworthy Internet: Privacy-Aware Transfer of Digital Identity Document in bound to XML-based digital identity document. We explain that the forwarding engine verifies the validity of digital identity document transmission on the basis of identity contract terms. Three use cases are presented to detail the proposed approach with the corresponding UML sequence diagrams.
发表于 2025-3-25 14:56:11 | 显示全部楼层
Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Usiny management protocol design for simultaneous multiple groups. The proposed scheme achieves significant reduction in rekeying cost, storage compared to these schemes. Interestingly, we achieve this efficiency in the rekeying cost without much increase in storage at user.
发表于 2025-3-25 16:00:51 | 显示全部楼层
Effective Implementation of DES Algorithm for Voice Scramblingurage eavesdropping from co-channel users or RF scanners. The DES design is implemented on Virtex 5 XC5VLX110T Field Programming Gate Arrays (FPGA) technology. Final 16-stage pipelined design is achieved with encryption rate of 35.5 Gbit/s and 2140 number of Configurable logic blocks (CLBs).
发表于 2025-3-25 23:31:59 | 显示全部楼层
Multilingual Speaker Identification with the Constraint of Limited Data Using Multitaper MFCCtracted and modeled using Gaussian Mixture Model (GMM)-Universal Background Model (UBM). The results show that the multitaper MFCC approach performs better than the conventional Hamming window MFCC technique in all the speaker identification experiments.
发表于 2025-3-26 02:11:10 | 显示全部楼层
发表于 2025-3-26 06:12:26 | 显示全部楼层
1865-0929 nal Conference on Recent Trends in Computer Networks and Distributed Systems Security, held in Trivandrum, India, in October 2012. The 34 revised full papers and 8 poster presentations were carefully reviewed and selected from 112 submissions. The papers cover various topics in Computer Networks and
发表于 2025-3-26 10:34:17 | 显示全部楼层
发表于 2025-3-26 14:04:23 | 显示全部楼层
发表于 2025-3-26 17:05:48 | 显示全部楼层
Imperceptible Image Indexing Using Digital Watermarkingodifications to such pixel will not attract the attention of human eyes. Watermark is thus integrated imperceptibly into the digital images. The proposed is a scheme for embedding a unique index number as watermark for content tracking and identification.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-18 07:12
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表