找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security Technology; International Confer Tai-hoon Kim,Hojjat Adeli,Muhammad Khurram Khan Conference proceedings 2011 The Editor(s) (if app

[复制链接]
楼主: damped
发表于 2025-3-26 22:04:23 | 显示全部楼层
Microscopic Analysis of Chips, specific requirements. For this reason, it is essential to examine various properties of chips; one of those can be, e.g., the chip security with respect to its physical structure. This paper provides description of a proven chip decapsulation process (the presented process can be used to obtain ba
发表于 2025-3-27 04:00:59 | 显示全部楼层
发表于 2025-3-27 05:28:05 | 显示全部楼层
发表于 2025-3-27 09:27:06 | 显示全部楼层
A Study on Domain Name System as Lookup Manager for Wireless/Mobile Systems in IPv6 Networks,e to transparently maintain connections while moving from one subnet to another. Each device is identified by its home address although it may be connecting to through another network. When connecting through a foreign network, a mobile device sends its location information to a home agent, which in
发表于 2025-3-27 16:26:22 | 显示全部楼层
An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval, measured privacy risk as a divergence between the user’s and the population’s query distribution, and contemplated the entropy of the user’s distribution as a particular case. In this work, we make a twofold contribution. First, we thoroughly interpret and justify the privacy metric proposed in our
发表于 2025-3-27 21:31:02 | 显示全部楼层
发表于 2025-3-27 23:38:48 | 显示全部楼层
Cryptanalysis of an Enhanced Simple Three-Party Key Exchange Protocol,ively adopted in network communications. In 2009, Nam et al. pointed out that S-3PAKE protocol, by Lu and Cao for password-authenticated key exchange in the three-party setting, is vulnerable to an off-line dictionary attack. Then, they proposed some countermeasures how to eliminate the security vul
发表于 2025-3-28 05:46:33 | 显示全部楼层
An Effective Distance-Computing Method for Network Anomaly Detection, of them are based on data mining or machine learning methods, which brings unexpected heavy computational cost and high false alarm rates. In this paper, we propose a simple distance-computing algorithm for network anomaly detection, which is able to distinguish network anomalies from normal traffi
发表于 2025-3-28 07:16:11 | 显示全部楼层
发表于 2025-3-28 10:59:49 | 显示全部楼层
Information Technology Security Governance Approach Comparison in E-banking,omponents of an e-banking environment, clarify congruent terminology used in achieving Information Security Governance (ISG) objectives and evaluate most reputed ITSG approaches to help banks choose which approach best fits the e-banking environment.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-8 17:32
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表