用户名  找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Recent Trends in Computer Networks and Distributed Systems Security; International Confer Sabu M. Thampi,Albert Y. Zomaya,Tony Thomas Confe

[复制链接]
楼主: intrinsic
发表于 2025-3-28 17:53:23 | 显示全部楼层
发表于 2025-3-28 19:20:49 | 显示全部楼层
Imperceptible Image Indexing Using Digital Watermarkingtermarking is less sensitive to HVS (Human Visual System). Edge detectors are used to estimate regions in the image where intensity changes rapidly. Modifications to such pixel will not attract the attention of human eyes. Watermark is thus integrated imperceptibly into the digital images. The propo
发表于 2025-3-29 01:12:47 | 显示全部楼层
A New Deterministic Algorithm for Testing Primality Based on a New Property of Prime Numbersyields all of the prime numbers and no composites. Due to this uncertainty surrounding the theory of prime numbers, popular algorithms proposed in literature till date, rely heavily on probabilistic methods to determine primality. The paper proposes a new theory on the nature of prime numbers. In pa
发表于 2025-3-29 06:46:46 | 显示全部楼层
Multilingual Speaker Identification with the Constraint of Limited Data Using Multitaper MFCCultitaper Mel-frequency cepstral coefficient (multitaper MFCC) features for Multilingual speaker identification with the constraint of limited data. The speaker identification study is conducted using 30 speakers of our own database. Sine-weighted cepstrum estimator (SWCE) taper MFCC features are ex
发表于 2025-3-29 10:15:18 | 显示全部楼层
Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Usination of simultaneous/concurrent multiple groups in the Secure Group Communication model with overlapping memberships. Designing a secure key management scheme with efficient rekeying process in this scenario is a challenging task. We design an efficient secure group key management scheme for simult
发表于 2025-3-29 15:26:31 | 显示全部楼层
发表于 2025-3-29 18:07:41 | 显示全部楼层
Simulation and Evaluation of Different Mobility Models in Ad-Hoc Sensor Network over DSR Protocol Usis used for evaluation of wireless networks. WSN is Multi-hop Self-configuring and consists of sensor nodes. The movements of nodes are like the patterns which can be classified into different mobility models and each of them have been characterized by its own distinctive features and also plays an
发表于 2025-3-29 21:11:29 | 显示全部楼层
Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functionsguarding against attempts to establish fraudulent multiple identities or prevent identity fraud. The greatest advantage that the biometric data of an individual remains constant acts as its biggest liability. Once the attacker gets biometric password of an individual then security of his data become
发表于 2025-3-30 03:08:08 | 显示全部楼层
发表于 2025-3-30 05:09:05 | 显示全部楼层
A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacksthis context, smart card industries try to overcome the anomaly by implementing various countermeasures. In this paper we discuss and present a powerful attack based on the vulnerability of the linker which could change the correct byte code into malicious one. During the attack, the linker interpre
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-27 13:06
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表