找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Applications and Techniques in Information Security; 6th International Co Wenjia Niu,Gang Li,Lynn Batten Conference proceedings 2015 Spring

[復(fù)制鏈接]
樓主: necrosis
11#
發(fā)表于 2025-3-23 11:49:16 | 只看該作者
A Lightweight Code-Based Authentication Protocol for RFID Systems so on. With the widespread adoption of RFID, the security and privacy issues of RFID systems are drawing more and more attention. In this paper, we propose a lightweight mutual authentication protocol based on error correction code for RFID systems with constant authentication time. Further analysi
12#
發(fā)表于 2025-3-23 16:53:49 | 只看該作者
13#
發(fā)表于 2025-3-23 20:01:27 | 只看該作者
Structural Analysis of IWA Social Networkonsible comments or articles. While most of related work focused on how to detect IWA using a classifier, there is a lack of analysis about the distribution and behavior characteristics of the special group. To address this issue, this paper constructs an IWA social network in which IWAs are core no
14#
發(fā)表于 2025-3-23 22:20:11 | 只看該作者
A Differentially Private Method for Reward-Based Spatial Crowdsourcingsolution requires the workers send their locations to a centralized server, which leads to a privacy threat. One of the key challenges of spatial crowdsourcing is to maximize the number of assigned tasks with workers’ location privacy preserved. In this paper, we focus on the reward-based spatial cr
15#
發(fā)表于 2025-3-24 05:33:35 | 只看該作者
Do Applications Perform Its Original Design? A Preliminary Analysis from Internet Big Dataer TCP. Every application layer protocol is designed to perform a specific purpose, for example File Transfer Protocol (FTP) is designed for file transfer. Therefore every application layer protocol has different performance expectations. In this paper, we try to observe that whether characteristics
16#
發(fā)表于 2025-3-24 09:38:56 | 只看該作者
Trust Prediction with Trust Antecedent Framework Regularizationintegrative and well-known model in management science, which takes ability, benevolence and integrity as three key factors to explain how trust relations are established between a trustor and a trustee. In this paper, we propose a new trust prediction model based on Trust Antecedent framework (TA)
17#
發(fā)表于 2025-3-24 11:08:33 | 只看該作者
18#
發(fā)表于 2025-3-24 15:33:34 | 只看該作者
19#
發(fā)表于 2025-3-24 21:27:27 | 只看該作者
A Differentially Private Method for Reward-Based Spatial Crowdsourcingowdsourcing and propose a two-stage method which consists of constructing a differentially private contour plot followed by task assignment with optimized-reward allocation. Experiments on real dataset demonstrate the availability of the proposed method.
20#
發(fā)表于 2025-3-25 00:35:26 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-13 06:05
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
当涂县| 平凉市| 康乐县| 塘沽区| 台湾省| 邵武市| 灵台县| 塔城市| 朝阳县| 开封县| 淮安市| 尖扎县| 黑山县| 东宁县| 涞水县| 平乡县| 安宁市| 会宁县| 麦盖提县| 淳化县| 桐乡市| 孟州市| 济南市| 望江县| 高雄县| 翁源县| 胶州市| 建水县| 漳浦县| 宜宾市| 淅川县| 女性| 吉隆县| 独山县| 沈丘县| 文成县| 普安县| 南通市| 宜川县| 龙川县| 高平市|