找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Applications and Techniques in Information Security; 6th International Co Wenjia Niu,Gang Li,Lynn Batten Conference proceedings 2015 Spring

[復(fù)制鏈接]
樓主: necrosis
11#
發(fā)表于 2025-3-23 11:49:16 | 只看該作者
A Lightweight Code-Based Authentication Protocol for RFID Systems so on. With the widespread adoption of RFID, the security and privacy issues of RFID systems are drawing more and more attention. In this paper, we propose a lightweight mutual authentication protocol based on error correction code for RFID systems with constant authentication time. Further analysi
12#
發(fā)表于 2025-3-23 16:53:49 | 只看該作者
13#
發(fā)表于 2025-3-23 20:01:27 | 只看該作者
Structural Analysis of IWA Social Networkonsible comments or articles. While most of related work focused on how to detect IWA using a classifier, there is a lack of analysis about the distribution and behavior characteristics of the special group. To address this issue, this paper constructs an IWA social network in which IWAs are core no
14#
發(fā)表于 2025-3-23 22:20:11 | 只看該作者
A Differentially Private Method for Reward-Based Spatial Crowdsourcingsolution requires the workers send their locations to a centralized server, which leads to a privacy threat. One of the key challenges of spatial crowdsourcing is to maximize the number of assigned tasks with workers’ location privacy preserved. In this paper, we focus on the reward-based spatial cr
15#
發(fā)表于 2025-3-24 05:33:35 | 只看該作者
Do Applications Perform Its Original Design? A Preliminary Analysis from Internet Big Dataer TCP. Every application layer protocol is designed to perform a specific purpose, for example File Transfer Protocol (FTP) is designed for file transfer. Therefore every application layer protocol has different performance expectations. In this paper, we try to observe that whether characteristics
16#
發(fā)表于 2025-3-24 09:38:56 | 只看該作者
Trust Prediction with Trust Antecedent Framework Regularizationintegrative and well-known model in management science, which takes ability, benevolence and integrity as three key factors to explain how trust relations are established between a trustor and a trustee. In this paper, we propose a new trust prediction model based on Trust Antecedent framework (TA)
17#
發(fā)表于 2025-3-24 11:08:33 | 只看該作者
18#
發(fā)表于 2025-3-24 15:33:34 | 只看該作者
19#
發(fā)表于 2025-3-24 21:27:27 | 只看該作者
A Differentially Private Method for Reward-Based Spatial Crowdsourcingowdsourcing and propose a two-stage method which consists of constructing a differentially private contour plot followed by task assignment with optimized-reward allocation. Experiments on real dataset demonstrate the availability of the proposed method.
20#
發(fā)表于 2025-3-25 00:35:26 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-13 04:13
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
铜鼓县| 嘉禾县| 汕头市| 南雄市| 黄石市| 迁安市| 沅江市| 姜堰市| 清河县| 汉源县| 新和县| 南涧| 德安县| 瑞昌市| 青铜峡市| 共和县| 淳安县| 威海市| 体育| 喜德县| 大丰市| 闽清县| 吉林省| 广元市| 盘山县| 怀柔区| 广河县| 黑水县| 博客| 醴陵市| 新河县| 无棣县| 温宿县| 广丰县| 开远市| 万年县| 临海市| 邻水| 日喀则市| 东辽县| 南通市|