標(biāo)題: Titlebook: E-Business and Telecommunications; 17th International C Mohammad S. Obaidat,Jalel Ben-Othman Conference proceedings 2021 Springer Nature Sw [打印本頁] 作者: 能干 時間: 2025-3-21 16:18
書目名稱E-Business and Telecommunications影響因子(影響力)
書目名稱E-Business and Telecommunications影響因子(影響力)學(xué)科排名
書目名稱E-Business and Telecommunications網(wǎng)絡(luò)公開度
書目名稱E-Business and Telecommunications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱E-Business and Telecommunications被引頻次
書目名稱E-Business and Telecommunications被引頻次學(xué)科排名
書目名稱E-Business and Telecommunications年度引用
書目名稱E-Business and Telecommunications年度引用學(xué)科排名
書目名稱E-Business and Telecommunications讀者反饋
書目名稱E-Business and Telecommunications讀者反饋學(xué)科排名
作者: Override 時間: 2025-3-21 23:48 作者: Clinch 時間: 2025-3-22 02:36 作者: Hirsutism 時間: 2025-3-22 07:20
usiness analysts’ role in information management and system development. Findings of this paper show that analysts can support information system developers in capturing the opportunities and in requirement elicitation by particular abilities of requirement mapping a cooperation with stakeholders作者: conscribe 時間: 2025-3-22 10:00
https://doi.org/10.1007/978-3-540-75265-3iable nature of such a system. According to the node’s supply voltage, varying from 1.8?V to 3.3?V, it is possible to perform a measurement and a transmission of the sensor data several times a day from a WiFi signal as low as ?20 dBm.作者: Mast-Cell 時間: 2025-3-22 16:10
Business Analyst Tasks for Requirement Elicitation,usiness analysts’ role in information management and system development. Findings of this paper show that analysts can support information system developers in capturing the opportunities and in requirement elicitation by particular abilities of requirement mapping a cooperation with stakeholders作者: Mast-Cell 時間: 2025-3-22 20:23
Overall Feasibility of RF Energy Harvesting for IoT,iable nature of such a system. According to the node’s supply voltage, varying from 1.8?V to 3.3?V, it is possible to perform a measurement and a transmission of the sensor data several times a day from a WiFi signal as low as ?20 dBm.作者: 等待 時間: 2025-3-23 01:05
1865-0929 less networks and mobile systems.The 10 full papers included in the volume were carefully selected from the 30 submissions accepted to participate in the conference..978-3-030-90427-2978-3-030-90428-9Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: HPA533 時間: 2025-3-23 04:56 作者: alleviate 時間: 2025-3-23 07:49 作者: Flinch 時間: 2025-3-23 12:28 作者: 可轉(zhuǎn)變 時間: 2025-3-23 14:30 作者: 使饑餓 時間: 2025-3-23 21:57
Security and Complexity of a New Variant of the McEliece Cryptosystem Using Non-linear Convolutionag capacity. It is shown that the new variant has small key sizes with enhanced security-complexity trade-off. Cryptanalysis of the new version of the McEliece cryptosystem is performed using existing attacks of the classical cryptosystem to demonstrate the difficulties in breaking the new cryptosyst作者: colloquial 時間: 2025-3-23 23:22
A Secure Distributed Hash-Based Encryption Mode of Operation Suited for Big Data Systems,ential encryption over the entire plaintext. Our solution offers an alternative that guarantees the same properties as CBC, and even enhances some of them (namely the diffusion property), while offering the possibility for parallel encryption which makes it more efficient especially in distributed e作者: 細(xì)微差別 時間: 2025-3-24 04:34 作者: boisterous 時間: 2025-3-24 07:24 作者: 非實體 時間: 2025-3-24 14:41 作者: hemophilia 時間: 2025-3-24 17:36 作者: 暗語 時間: 2025-3-24 21:28
https://doi.org/10.1057/9781137031730ential encryption over the entire plaintext. Our solution offers an alternative that guarantees the same properties as CBC, and even enhances some of them (namely the diffusion property), while offering the possibility for parallel encryption which makes it more efficient especially in distributed e作者: 野蠻 時間: 2025-3-24 23:10 作者: 低能兒 時間: 2025-3-25 07:07 作者: debouch 時間: 2025-3-25 08:41
E-Business and Telecommunications978-3-030-90428-9Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 陪審團(tuán) 時間: 2025-3-25 12:15 作者: IRS 時間: 2025-3-25 16:23 作者: Extemporize 時間: 2025-3-25 20:22 作者: Wallow 時間: 2025-3-26 03:16 作者: 高歌 時間: 2025-3-26 07:11
Communications in Computer and Information Sciencehttp://image.papertrans.cn/e/image/300014.jpg作者: 來自于 時間: 2025-3-26 09:57 作者: Interregnum 時間: 2025-3-26 16:28 作者: Affection 時間: 2025-3-26 17:39
niques have been recently applied to the cloud, facing some critical issues especially when integrated within existing security processes and executed in a programmatic way. Furthermore, they pose significant costs when hybrid systems, mixing public and private infrastructures, are considered. In th作者: enflame 時間: 2025-3-26 22:27
context of decentralized end-to-end encrypted email and secure messaging, i.e., without a public key infrastructure or a trusted third party. This not only simplifies the EA process by requiring users to share only a low-entropy secret such as a memorable word, but it also allows us to establish a 作者: Euthyroid 時間: 2025-3-27 03:09
ul to the Internet of Things or Wireless Sensor Networks applications with cloud support. The construction of practically efficient attribute-based encryption (ABE) schemes for CASs is faced with the fact that these access structures cannot be represented by Boolean formulas. The use of multilinear 作者: FICE 時間: 2025-3-27 07:34 作者: concentrate 時間: 2025-3-27 11:30 作者: Dna262 時間: 2025-3-27 15:55
lex transactions protocol correctness reduces to the formal proof of chained transactions protocol correctness. In this paper, we formally prove the correctness of the chained transaction protocol using Cl-AtSe model checker. The verification results obtained using Cl-AtSe demonstrate that all secur作者: 萬花筒 時間: 2025-3-27 20:15
https://doi.org/10.1007/978-3-540-75265-3 band. The node includes a temperature sensor and an RF microcontroller to send the measurements through Bluetooth Low Energy signal. After characterizing the energy consumption of the sensor node and measuring the available WiFi surrounding power, we were able to size the RF to DC converter and the作者: 高原 時間: 2025-3-27 22:36 作者: FIG 時間: 2025-3-28 02:30
A Secure Distributed Hash-Based Encryption Mode of Operation Suited for Big Data Systems,a storage and processing is witnessing a huge technological improvement thanks to the extensive research that is being conducted to improve these two areas. However, there is a lack of adaptability when it comes to security and more importantly encryption, as traditional security solutions are still作者: affluent 時間: 2025-3-28 07:29
An Assurance Framework and Process for Hybrid Systems,niques have been recently applied to the cloud, facing some critical issues especially when integrated within existing security processes and executed in a programmatic way. Furthermore, they pose significant costs when hybrid systems, mixing public and private infrastructures, are considered. In th作者: 河潭 時間: 2025-3-28 10:49 作者: 傾聽 時間: 2025-3-28 18:20
Practically Efficient Attribute-Based Encryption for Compartmented and Multilevel Access Structuresul to the Internet of Things or Wireless Sensor Networks applications with cloud support. The construction of practically efficient attribute-based encryption (ABE) schemes for CASs is faced with the fact that these access structures cannot be represented by Boolean formulas. The use of multilinear 作者: Engulf 時間: 2025-3-28 22:23 作者: 上下連貫 時間: 2025-3-29 00:48 作者: 吵鬧 時間: 2025-3-29 03:10
Chained Transaction Protocol Automated Verification Using Cl-AtSe,lex transactions protocol correctness reduces to the formal proof of chained transactions protocol correctness. In this paper, we formally prove the correctness of the chained transaction protocol using Cl-AtSe model checker. The verification results obtained using Cl-AtSe demonstrate that all secur作者: HEED 時間: 2025-3-29 07:15 作者: COLIC 時間: 2025-3-29 13:08