標(biāo)題: Titlebook: E-Business and Telecommunications; 15th International J Mohammad S. Obaidat Conference proceedings 2019 Springer Nature Switzerland AG 2019 [打印本頁(yè)] 作者: 贊美 時(shí)間: 2025-3-21 19:04
書(shū)目名稱(chēng)E-Business and Telecommunications影響因子(影響力)
書(shū)目名稱(chēng)E-Business and Telecommunications影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)E-Business and Telecommunications網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)E-Business and Telecommunications網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)E-Business and Telecommunications被引頻次
書(shū)目名稱(chēng)E-Business and Telecommunications被引頻次學(xué)科排名
書(shū)目名稱(chēng)E-Business and Telecommunications年度引用
書(shū)目名稱(chēng)E-Business and Telecommunications年度引用學(xué)科排名
書(shū)目名稱(chēng)E-Business and Telecommunications讀者反饋
書(shū)目名稱(chēng)E-Business and Telecommunications讀者反饋學(xué)科排名
作者: 流動(dòng)性 時(shí)間: 2025-3-21 20:41
Anonymity in Complex Transactions for e-Business,t to reveal sensitive data of his identity (as credit card number, information about customer’s bank, customer’s account number) so that this information can not be used by merchant in commercial purpose to build spending habits of the customer. Also, a merchant may want to remain anonymous. For exa作者: Urgency 時(shí)間: 2025-3-22 02:44
Generation of High Quality Microwave Signal Using Different Optoelectronic Techniques,implemented experimentally. The experimental results of signal generation using optoelectronic oscillator (OEO) are taken for three different long delay optical fiber lengths. The generated signal has a narrow bandwidth (less than 200?Hz) at carrier frequency of 2.31?GHz with phase noise less than ?作者: 砍伐 時(shí)間: 2025-3-22 05:48 作者: FICE 時(shí)間: 2025-3-22 12:33
Automated Verification of E-Commerce Protocols for Complex Transactions,rce protocol for complex transactions in that the customer wants to buy several different physical products from different merchants ensuring strong fair exchange, atomicity, effectiveness, timeliness, non-repudiation, integrity and confidentiality. In this paper, we improve the protocol for complex作者: 聲明 時(shí)間: 2025-3-22 16:26
Security for Distributed Machine Learning Based Software,data, decentralizing applications and integrating novel components seamlessly to the central systems. Distributively deployed AI capabilities will thrust this transition..Several non-functional requirements arise along with these developments, security being at the center of the discussions. Bearing作者: 聲明 時(shí)間: 2025-3-22 18:07 作者: Delectable 時(shí)間: 2025-3-22 23:28
Compile-Time Security Certification of Imperative Programming Languages,techniques in programming languages to enforce a finer-grained restriction on the propagation of information among untrusted objects. In this paper, we introduce a . (DL) algorithm (This paper is an extended version of the article [.] presented in SECRYPT’18.) for security certification of imperativ作者: 為敵 時(shí)間: 2025-3-23 05:00
Real-Time Noise Reduction Algorithm for Video with Non-linear FIR Filter, under poor lighting conditions for security purposes or night time news gathering. Videos shot under poor lighting conditions are afflicted by significant noise which degrades the image quality. The process of noise removal from videos is called noise reduction (NR). Although many NR methods are pr作者: 浪費(fèi)時(shí)間 時(shí)間: 2025-3-23 05:47
Cloudless Friend-to-Friend Middleware for Smartphones,hich usually reside in the cloud, are necessary for brokering communication between peers, and all communication must pass through them. A reason for this is that smartphones lack publicly reachable IP addresses. Also, because people carry their smartphones with them, smartphones will often disconne作者: 不要不誠(chéng)實(shí) 時(shí)間: 2025-3-23 09:53 作者: 大猩猩 時(shí)間: 2025-3-23 14:26 作者: 彎腰 時(shí)間: 2025-3-23 20:01 作者: 過(guò)份好問(wèn) 時(shí)間: 2025-3-24 00:26
,Die geistigen F?higkeiten der Bienen,to the RF signal. A jitter in the cavity resonances due to temperature variations is completely eliminated from the output beat signal. There is a 10?dB increase in the phase noise at the FSR frequency and its harmonics. The setup is tested with signals generated by two different microwave sources a作者: Little 時(shí)間: 2025-3-24 04:51
https://doi.org/10.1007/978-3-642-51347-3ifying group-level differences between (1) the sample of CEOs and the general population, and (2) between two groups of CEOs, when a history of rule-breaking behavior is considered. The predictive performance evaluation conducted on the current sample shows that the binary logistic regression model 作者: magenta 時(shí)間: 2025-3-24 06:47 作者: 原始 時(shí)間: 2025-3-24 13:24 作者: 過(guò)份艷麗 時(shí)間: 2025-3-24 15:25 作者: Genetics 時(shí)間: 2025-3-24 20:03
1865-0929 data communication networking, e-business, optical communication systems, security andcryptography, signal processing and multimedia applications, and wireless networks and mobile systems..978-3-030-34865-6978-3-030-34866-3Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: obstinate 時(shí)間: 2025-3-24 23:28 作者: 敬禮 時(shí)間: 2025-3-25 05:19
Generation of High Quality Microwave Signal Using Different Optoelectronic Techniques,to the RF signal. A jitter in the cavity resonances due to temperature variations is completely eliminated from the output beat signal. There is a 10?dB increase in the phase noise at the FSR frequency and its harmonics. The setup is tested with signals generated by two different microwave sources a作者: Root494 時(shí)間: 2025-3-25 11:00 作者: Bricklayer 時(shí)間: 2025-3-25 14:51 作者: Itinerant 時(shí)間: 2025-3-25 18:53
Real-Time Noise Reduction Algorithm for Video with Non-linear FIR Filter,ite impulse response (IIR) filter to reduce noise. This approach is known as the inter-frame relation, and the noise reducer comprises a temporal recursive filter. Temporal recursive filters are widely used in digital TV sets to reduce the noise affecting images. Although the temporal recursive filt作者: Banquet 時(shí)間: 2025-3-25 23:39
A Mixed Traffic Sharing and Resource Allocation for V2X Communication,source Allocation (MSRA) Algorithm to guarantee the low latency and the stringent reliability requirements of Safety V-UEs, and to maximize the sum rate capacity and respect the delay constraint of C-UEs and non Safety V-UEs, respectively, while respecting the signal-to-interference-plus-noise ratio作者: 省略 時(shí)間: 2025-3-26 03:57
Steganogaphy Using Mac-Independent Opportunistic Routing and Encoding (MORE) Protocol Based Communi to a 50% reduced time/computation complexity. Furthermore, we analyse the proposed schemes and discuss their vulnerability to steganalysis attacks, then we propose an enhancement against these attacks.作者: 極小量 時(shí)間: 2025-3-26 06:53
https://doi.org/10.1007/978-3-7091-3602-7 transactions from [.] by providing a more efficient protocol for each subtransaction from complex transaction. Also, we formally verify our improved solution using AVISPA. The verification results obtained using AVISPA demonstrate that our improved solution preserves all security requirements obtained in [.].作者: podiatrist 時(shí)間: 2025-3-26 12:00 作者: 新義 時(shí)間: 2025-3-26 15:32 作者: 獨(dú)特性 時(shí)間: 2025-3-26 17:39
Cloudless Friend-to-Friend Middleware for Smartphones,y of known peers, authentication mechanisms, and secure communication channels. In this paper, we propose a peer-to-peer middleware that provides these features without the need for centralized services.作者: Ledger 時(shí)間: 2025-3-26 23:54
Aus dem Gebiet der Funktionalgleichungenroducts from different merchants is proposed. This solution provides customer anonymity, non-repudiation, integrity and confidentiality of data exchanged between the parties. In this paper, we extend the solution from [.] obtaining both anonymity of customer and each merchant, while preserving all properties obtained in [.].作者: 公理 時(shí)間: 2025-3-27 04:49 作者: jeopardize 時(shí)間: 2025-3-27 09:04 作者: LUMEN 時(shí)間: 2025-3-27 12:51
Security for Distributed Machine Learning Based Software,yption (FHE), our approach enables the protection of Distributed Neural Networks, while processing encrypted data. On that respect we evaluate the feasibility of this solution on a Convolutional Neuronal Network (CNN) for image classification deployed on distributed infrastructures.作者: AROMA 時(shí)間: 2025-3-27 14:49 作者: Ringworm 時(shí)間: 2025-3-27 17:50
1865-0929 held in Porto, Portugal, in July 2018..ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; Internation作者: Mediocre 時(shí)間: 2025-3-27 22:56 作者: coalition 時(shí)間: 2025-3-28 05:26 作者: 警告 時(shí)間: 2025-3-28 06:35
Aus dem Gebiet der Funktionalgleichungent to reveal sensitive data of his identity (as credit card number, information about customer’s bank, customer’s account number) so that this information can not be used by merchant in commercial purpose to build spending habits of the customer. Also, a merchant may want to remain anonymous. For exa作者: Limerick 時(shí)間: 2025-3-28 12:49
,Die geistigen F?higkeiten der Bienen,implemented experimentally. The experimental results of signal generation using optoelectronic oscillator (OEO) are taken for three different long delay optical fiber lengths. The generated signal has a narrow bandwidth (less than 200?Hz) at carrier frequency of 2.31?GHz with phase noise less than ?作者: neologism 時(shí)間: 2025-3-28 18:02 作者: gorgeous 時(shí)間: 2025-3-28 21:23
https://doi.org/10.1007/978-3-7091-3602-7rce protocol for complex transactions in that the customer wants to buy several different physical products from different merchants ensuring strong fair exchange, atomicity, effectiveness, timeliness, non-repudiation, integrity and confidentiality. In this paper, we improve the protocol for complex作者: Ebct207 時(shí)間: 2025-3-29 02:09 作者: AWE 時(shí)間: 2025-3-29 04:52 作者: Obvious 時(shí)間: 2025-3-29 09:07
https://doi.org/10.1007/978-3-7091-2369-0techniques in programming languages to enforce a finer-grained restriction on the propagation of information among untrusted objects. In this paper, we introduce a . (DL) algorithm (This paper is an extended version of the article [.] presented in SECRYPT’18.) for security certification of imperativ作者: Infantry 時(shí)間: 2025-3-29 13:01
https://doi.org/10.1007/978-3-662-40323-5 under poor lighting conditions for security purposes or night time news gathering. Videos shot under poor lighting conditions are afflicted by significant noise which degrades the image quality. The process of noise removal from videos is called noise reduction (NR). Although many NR methods are pr作者: neologism 時(shí)間: 2025-3-29 19:33