找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Security in Computing and Communications; Second International Jaime Lloret Mauri,Sabu M. Thampi,Di Jin Conference proceedings 2014 Springe

[复制链接]
楼主: 麻烦
发表于 2025-3-30 09:02:48 | 显示全部楼层
Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structureses generalized access structure. The scheme is useful for non-ideal access structures. For example, Stinson [14] has identified eighteen possible non-isomorphic monotone access structures with four participants. Fourteen of them admit ideal and perfect secret sharing schemes. The remaining four cann
发表于 2025-3-30 12:41:57 | 显示全部楼层
An Approach to Cryptographic Key Exchange Using FingerprintIt consists of key generation, key storing and key sharing. A randomly generated long key (of 128, 190 or 256 bits) is difficult to remember. As a consequence, it is needed to be stored in a secured place. An additional authentication like knowledge or token based authentication is used to control t
发表于 2025-3-30 18:05:44 | 显示全部楼层
发表于 2025-3-30 23:47:55 | 显示全部楼层
发表于 2025-3-31 04:04:00 | 显示全部楼层
Forensic Analysis for Monitoring Database Transactionsan be used to prevent illegitimate banking transactions. The banks deals in public money but unfortunately are becoming vulnerable by receiving illegal money in the form of legitimate business. The absence of any preventive measures in the banks to monitor such scam would be perilous some day. If th
发表于 2025-3-31 05:43:05 | 显示全部楼层
发表于 2025-3-31 11:12:41 | 显示全部楼层
发表于 2025-3-31 15:56:10 | 显示全部楼层
Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networksand Cooperative HBHAs. The proposed metrics proved effective in measuring the severity of both CBA and HBHAs. Simulation using Java in Time Simulator/Scalable Wireless Adhoc Network Simulator (JiST/SWANS) showed that Independent HBHA is the most severe attack compared to Cooperative HBHA and CBA. In
发表于 2025-3-31 17:53:46 | 显示全部楼层
Peers Feedback and Compliance Based Trust Computation for Cloud Computingaking into account three different types of trust viz. interaction-based trust, compliance-based trust and recommendation-based trust. These types can be assigned appropriate weights to designate precedence among them in order to compute total trust. The model has been simulated using MATLAB. Simula
发表于 2025-3-31 22:27:24 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-5 15:43
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表