找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Recent Trends in Computer Networks and Distributed Systems Security; Second International Gregorio Martínez Pérez,Sabu M. Thampi,Lei Shu Co

[复制链接]
楼主: 愚蠢地活
发表于 2025-3-26 22:19:17 | 显示全部楼层
发表于 2025-3-27 03:16:33 | 显示全部楼层
Palmprint Recognition Using Fusion of 2D-Gabor and 2D Log-Gabor Featuresiae points, texture, ridges etc. Several line and texture extraction techniques for palmprint have been extensively studied. This paper presents an intra-modal authentication system based on texture information extracted from the palmprint using the 2D- Gabor and 2D-Log Gabor filters. An individual
发表于 2025-3-27 05:41:12 | 显示全部楼层
A New Variant of Algebraic Attackuce the degree of the algebraic equations as much as possible in order to obtain a lower time complexity. This paper presents one such means of obtaining low degree equations using the decomposition of Boolean functions. This method overcomes the two major drawbacks of fast algebraic attack. We have
发表于 2025-3-27 10:05:26 | 显示全部楼层
Enhanced Security of PHR System in Cloud Using Prioritized Level Based Encryptiond for categorizing the data based on the sensitivity level of the health records, since encrypting all the records using the same mechanism will not be fair and also paves the way for intruders to decrypt all the records if the algorithm is found. To achieve fine-grained and scalable data control fo
发表于 2025-3-27 13:49:49 | 显示全部楼层
Clustering Based Routing Strategies for Energy Management in Ad-Hoc Networksts provide comparative performance analysis of RE-CBRP, MC-CBRP, existing CBRP and Dynamic Source Routing (DSR) protocols. Results demonstrate that the network can be efficiently optimized with respect to energy using the RE-CBRP and MC-CBRP as compared to CBRP and DSR.
发表于 2025-3-27 19:53:43 | 显示全部楼层
发表于 2025-3-27 21:55:59 | 显示全部楼层
A Genetic Algorithm for Scheduling Workflow Applications in Unreliable Cloud Environmentmization genetic algorithm has been proposed which reduces the failure rate and makespan of workflow applications. It allocates those resources to workflow application which are reliable and cost of execution is under user budget. The performance of genetic algorithm has been compared with max-min a
发表于 2025-3-28 05:02:55 | 显示全部楼层
Autonomic SLA Management in Cloud Computing Serviceswill really help to limit the over provisioning of resources and thus leads to the optimum usage of resources. As a consolidation the proposed architecture may yield maximized Business Level Objectives (BLOs) to the cloud providers.
发表于 2025-3-28 08:11:53 | 显示全部楼层
A Novel Audio Watermark Embedding and Extraction Method Based on Compressive Sensing, Sinusoidal Codusing sinusoidal speech coding bases and compressive sensing measurement matrix. Experimental results show that proposed method provide exact recovery of watermark information and host signal under noisy attacks.
发表于 2025-3-28 11:19:48 | 显示全部楼层
Cryptanalysis of Two Authentication Scheme for DRM Systeming biometric keys in which user and server can mutually authenticate each other. We analyze both the schemes and show that both the schemes fail to prove their claim of resistance to most common attacks. Fan et al.’s scheme has failed to resist known session specific temporary information attack an
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-10 05:34
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表