找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Advances in Security Technology; International Confer Haeng-kon Kim,Tai-hoon Kim,Akingbehin Kiumi Conference proceedings 2009 Springer-Verl

[復(fù)制鏈接]
樓主: 鳥場(chǎng)
21#
發(fā)表于 2025-3-25 05:31:56 | 只看該作者
Bidirectional Quantum Secure Direct Communication Based on Entanglement,es have been imposed on high-dimensional Bell states via the local unitary operations with superdense coding. Security analysis indicates that this scheme is secure against the present Trojan horse attack and the current attack strategyand it can also ensure the security of the messages in a low noisy channel.
22#
發(fā)表于 2025-3-25 11:19:07 | 只看該作者
23#
發(fā)表于 2025-3-25 12:37:08 | 只看該作者
24#
發(fā)表于 2025-3-25 18:58:45 | 只看該作者
Evaluating the Applicability of a Use Case Precedence Diagram Based Approach in Software Developmenrolled experiment based on this approach with professionals who have had at least two years of experience in software projects. The results obtained from this experiment show that our approach enables developers to define construction sequences more precisely than with other ad-hoc techniques.
25#
發(fā)表于 2025-3-25 22:28:17 | 只看該作者
A Secured Technique for Image Data Hiding,, the starting point of encoding the image data is depended on the size of the images and it is stored within the encoded image at the end of its header information as a cipher text.; secondly, the target image is hidden behind the cover image by following our encrypted image hiding technique.
26#
發(fā)表于 2025-3-26 02:15:14 | 只看該作者
Ahmad Abdelfattah,Stan Tomov,Jack Dongarrasy spam reporter”. This module enables victims to report spam contents to the administrator directly. The reported contents and information, of course, are shared with other domains as a black list. Through the experimental result, we showed this system is enough to prevent, detect, and block VoIP spam.
27#
發(fā)表于 2025-3-26 06:58:13 | 只看該作者
Vladislava Churuksaeva,Alexander Starchenkoy an individual by comparing the feature obtained from the feature extraction algorithm with the previously stored feature by producing a similarity score. This score will be indicating the degree of similarity between a pair of biometrics data under consideration. Depending on degree of similarity, individual can be identified.
28#
發(fā)表于 2025-3-26 12:01:59 | 只看該作者
29#
發(fā)表于 2025-3-26 16:14:32 | 只看該作者
30#
發(fā)表于 2025-3-26 16:48:11 | 只看該作者
Andrey Epikhin,Matvey Kraposhinross-layered permission assignment is devised based on some popular information security models such as RBAC, DTE and etc. And a corresponding prototype system is implemented based on Linux. Finally, some preliminary test results are analyzed and further research directions are pointed out.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-23 10:51
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
临安市| 阿拉善左旗| 佛山市| 莎车县| 扎囊县| 麻江县| 宝丰县| 阳城县| 阿荣旗| 新巴尔虎右旗| 昌邑市| 大埔县| 青海省| 普陀区| 万年县| 青冈县| 盐山县| 永登县| 甘肃省| 濮阳县| 沭阳县| 家居| 都匀市| 大安市| 南华县| 上饶市| 延安市| 宜城市| 海伦市| 靖西县| 稷山县| 芦山县| 砀山县| 正宁县| 万安县| 九寨沟县| 香港 | 北京市| 阆中市| 昌图县| 泰兴市|