找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Applications and Techniques in Information Security; 6th International Co Wenjia Niu,Gang Li,Lynn Batten Conference proceedings 2015 Spring

[復(fù)制鏈接]
樓主: necrosis
11#
發(fā)表于 2025-3-23 11:49:16 | 只看該作者
A Lightweight Code-Based Authentication Protocol for RFID Systems so on. With the widespread adoption of RFID, the security and privacy issues of RFID systems are drawing more and more attention. In this paper, we propose a lightweight mutual authentication protocol based on error correction code for RFID systems with constant authentication time. Further analysi
12#
發(fā)表于 2025-3-23 16:53:49 | 只看該作者
13#
發(fā)表于 2025-3-23 20:01:27 | 只看該作者
Structural Analysis of IWA Social Networkonsible comments or articles. While most of related work focused on how to detect IWA using a classifier, there is a lack of analysis about the distribution and behavior characteristics of the special group. To address this issue, this paper constructs an IWA social network in which IWAs are core no
14#
發(fā)表于 2025-3-23 22:20:11 | 只看該作者
A Differentially Private Method for Reward-Based Spatial Crowdsourcingsolution requires the workers send their locations to a centralized server, which leads to a privacy threat. One of the key challenges of spatial crowdsourcing is to maximize the number of assigned tasks with workers’ location privacy preserved. In this paper, we focus on the reward-based spatial cr
15#
發(fā)表于 2025-3-24 05:33:35 | 只看該作者
Do Applications Perform Its Original Design? A Preliminary Analysis from Internet Big Dataer TCP. Every application layer protocol is designed to perform a specific purpose, for example File Transfer Protocol (FTP) is designed for file transfer. Therefore every application layer protocol has different performance expectations. In this paper, we try to observe that whether characteristics
16#
發(fā)表于 2025-3-24 09:38:56 | 只看該作者
Trust Prediction with Trust Antecedent Framework Regularizationintegrative and well-known model in management science, which takes ability, benevolence and integrity as three key factors to explain how trust relations are established between a trustor and a trustee. In this paper, we propose a new trust prediction model based on Trust Antecedent framework (TA)
17#
發(fā)表于 2025-3-24 11:08:33 | 只看該作者
18#
發(fā)表于 2025-3-24 15:33:34 | 只看該作者
19#
發(fā)表于 2025-3-24 21:27:27 | 只看該作者
A Differentially Private Method for Reward-Based Spatial Crowdsourcingowdsourcing and propose a two-stage method which consists of constructing a differentially private contour plot followed by task assignment with optimized-reward allocation. Experiments on real dataset demonstrate the availability of the proposed method.
20#
發(fā)表于 2025-3-25 00:35:26 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-13 04:13
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
班戈县| 巨野县| 铜鼓县| 仙游县| 郁南县| 长岭县| 福安市| 杭州市| 偏关县| 介休市| 喜德县| 山西省| 泌阳县| 阿克陶县| 东乡| 邳州市| 罗定市| 上思县| 旺苍县| 衢州市| 腾冲县| 临汾市| 富宁县| 彭水| 威宁| 宜城市| 阳谷县| 平舆县| 随州市| 文登市| 海原县| 海伦市| 福安市| 平和县| 陆河县| 柳州市| 宁远县| 兴山县| 灵璧县| 淮滨县| 洞头县|