標題: Titlebook: E-Business and Telecommunications; 13th International J Mohammad S. Obaidat Conference proceedings 2017 Springer International Publishing A [打印本頁] 作者: affected 時間: 2025-3-21 17:27
書目名稱E-Business and Telecommunications影響因子(影響力)
書目名稱E-Business and Telecommunications影響因子(影響力)學(xué)科排名
書目名稱E-Business and Telecommunications網(wǎng)絡(luò)公開度
書目名稱E-Business and Telecommunications網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱E-Business and Telecommunications被引頻次
書目名稱E-Business and Telecommunications被引頻次學(xué)科排名
書目名稱E-Business and Telecommunications年度引用
書目名稱E-Business and Telecommunications年度引用學(xué)科排名
書目名稱E-Business and Telecommunications讀者反饋
書目名稱E-Business and Telecommunications讀者反饋學(xué)科排名
作者: 低位的人或事 時間: 2025-3-21 20:37
Multipath Forwarding in Named Data Networking: Flow, Fairness, and Context-Awarenessis paper, we elicit essential requirements for forwarding strategies and show that existing strategies struggle to fully fulfill these requirements. After that, we investigate how to unlock the full capabilities of NDN by enabling the consideration of context information in the forwarding plane. In 作者: PHON 時間: 2025-3-22 03:39 作者: Incisor 時間: 2025-3-22 07:55 作者: 厚臉皮 時間: 2025-3-22 10:55 作者: Headstrong 時間: 2025-3-22 14:17 作者: Headstrong 時間: 2025-3-22 18:49 作者: 釘牢 時間: 2025-3-23 00:14 作者: Tincture 時間: 2025-3-23 04:04
Hardware Implementation of HS1-SIVn this paper. Given implementation of HS1-SIV cipher was developed in such a way to be conforming to the specification of the authenticated cipher as well as a hardware API. The implemented API is conforming to the specifications of the GMU Hardware API for authenticated ciphers. The VHDL implementa作者: 細絲 時間: 2025-3-23 07:38
Runtime Classification of Mobile Malware for?Resource-Constrained Devicesof existing malware are challenging tasks and most of the currently proposed solutions are focused on only one of the mentioned aspects..In this work, we propose a solution that is able to detect malware that appears at runtime and, at the same time, provides useful information to discriminate betwe作者: GNAT 時間: 2025-3-23 13:00 作者: Ceremony 時間: 2025-3-23 17:22 作者: Spina-Bifida 時間: 2025-3-23 19:06 作者: 表被動 時間: 2025-3-23 23:59
Attribute-Based Privacy-Friendly Access Control with Contextke strong authentication. We propose a secure and privacy-friendly way to augment authentication mechanisms of Online services by taking context into account. Contextual information, such as location, proximity or the current role of a user in a system is useful to help authenticate and authorize us作者: AVOW 時間: 2025-3-24 05:37 作者: 吝嗇性 時間: 2025-3-24 07:46 作者: QUAIL 時間: 2025-3-24 12:19
Completing Your Knowledge of Azure SQL, present at SMEs as well as the PSS research. To attract interest of SMEs in PSS a framework that is suitable to fit their needs is required. Hence, a first step is presented in this paper as the interaction based approach will help to make complex PSS frameworks applicable for SMEs.作者: Carcinogenesis 時間: 2025-3-24 16:12 作者: 凝結(jié)劑 時間: 2025-3-24 19:39
BDS/GPS Dual-Mode Software Receiver the hidden secret. They can later be unveiled in another multi-party computation..This work is an extended version of a conference paper?[.]. In this version, we work out the details of our construction. Our results corroborate the feasibility of an electronic voting machine that is oblivious to th作者: faction 時間: 2025-3-25 02:59 作者: Insufficient 時間: 2025-3-25 06:48 作者: 凹槽 時間: 2025-3-25 09:26 作者: corporate 時間: 2025-3-25 12:48
Security Framework for Adopting Mobile Applications in Small and Medium Enterprisesa mobile security framework that mainly supports SMEs by adopting mobile applications. Potential threats have been included in a risk catalogue, which forms a main component of the presented framework. This catalogue will help business users in extending their awareness of possible mobile security r作者: 健忘癥 時間: 2025-3-25 19:09 作者: AGATE 時間: 2025-3-25 21:34
Runtime Classification of Mobile Malware for?Resource-Constrained Devicesype of malware is being executed. In order to achieve low consumption, we minimize the set of observed system parameters to only the most informative ones for both detection and classification and we offload part of the calculations related to discrimination between diverse types of malware to an ex作者: elastic 時間: 2025-3-26 00:38 作者: ureter 時間: 2025-3-26 06:50 作者: 態(tài)度暖昧 時間: 2025-3-26 12:16 作者: Indict 時間: 2025-3-26 15:29 作者: Sedative 時間: 2025-3-26 20:00
Ancient Salt Roads in Northern China,k caching, fairness, Interest aggregation, context-awareness, and scalability. We expect . to be a step closer to adaptive, effective and efficient forwarding that satisfies both NDN consumers and providers.作者: 鋼筆記下懲罰 時間: 2025-3-27 00:03
ng both static and dynamic aspects of collaboration versions. Secondly, it presents a mapping approach for deducing version of choreography from version of collaboration. Thirdly, it introduces the BPMN4V-Modeler, which is an implementation of BPMN4V on top of the well-known BPMN-Modeler Eclipse plug-in.作者: SPASM 時間: 2025-3-27 01:20 作者: 性別 時間: 2025-3-27 07:18
https://doi.org/10.1007/978-94-011-6660-7y set at 32 bytes. Based on the performance results obtained hardware API overhead was calculated which is equal to 8% for 8-byte data length and 15% for 2048-byte data length when compared to the cipher-core.作者: 我悲傷 時間: 2025-3-27 11:34 作者: Magisterial 時間: 2025-3-27 13:43 作者: overture 時間: 2025-3-27 19:54 作者: Feckless 時間: 2025-3-28 00:56 作者: Little 時間: 2025-3-28 03:41
User Perceptions of Internet of Things (IoT) Systemsthirty-three (33) fundamental factors. Also, it formally defines these thirty-three (33) factors in order to establish a universally accepted model regarding user perceptions of a particular IoT system.作者: 鬼魂 時間: 2025-3-28 06:18 作者: epicondylitis 時間: 2025-3-28 11:34 作者: 遠足 時間: 2025-3-28 14:42
Conference proceedings 2011Latest editione device and this is the reason why the features can be useful to distinguish the owner from an impostor. Results show that our system, modeling the user behavior of 21 volunteer participants, obtains encouraging results, since we measured a precision in distinguishing an impostor from the owner between 99% and 100%.作者: 貪心 時間: 2025-3-28 22:23 作者: 猛烈責(zé)罵 時間: 2025-3-29 01:26
A Methodology for Silent and Continuous Authentication in Mobile Environmente device and this is the reason why the features can be useful to distinguish the owner from an impostor. Results show that our system, modeling the user behavior of 21 volunteer participants, obtains encouraging results, since we measured a precision in distinguishing an impostor from the owner between 99% and 100%.作者: Arboreal 時間: 2025-3-29 06:25 作者: Genetics 時間: 2025-3-29 11:12
https://doi.org/10.1007/978-3-642-52720-3zes edit control between two or more contents, and is effective with Internet contents such as consumer generated media represented by YouTube. We also evaluate the security of our proposed scheme against various attacks.作者: RUPT 時間: 2025-3-29 13:18 作者: 不確定 時間: 2025-3-29 17:00 作者: 不幸的人 時間: 2025-3-29 22:18 作者: 恃強凌弱的人 時間: 2025-3-29 23:57 作者: Obsequious 時間: 2025-3-30 06:36 作者: 截斷 時間: 2025-3-30 11:51
ess Management (BPM) systems must face before their definitive acceptance and use in companies. This issue has mainly been investigated in the context of intra-organizational processes but it received little attention in the context of Inter-organizational Processes (IoP), which correspond to proces