找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Recent Trends in Computer Networks and Distributed Systems Security; International Confer Sabu M. Thampi,Albert Y. Zomaya,Tony Thomas Confe

[復(fù)制鏈接]
樓主: intrinsic
41#
發(fā)表于 2025-3-28 17:53:23 | 只看該作者
42#
發(fā)表于 2025-3-28 19:20:49 | 只看該作者
Imperceptible Image Indexing Using Digital Watermarkingtermarking is less sensitive to HVS (Human Visual System). Edge detectors are used to estimate regions in the image where intensity changes rapidly. Modifications to such pixel will not attract the attention of human eyes. Watermark is thus integrated imperceptibly into the digital images. The propo
43#
發(fā)表于 2025-3-29 01:12:47 | 只看該作者
A New Deterministic Algorithm for Testing Primality Based on a New Property of Prime Numbersyields all of the prime numbers and no composites. Due to this uncertainty surrounding the theory of prime numbers, popular algorithms proposed in literature till date, rely heavily on probabilistic methods to determine primality. The paper proposes a new theory on the nature of prime numbers. In pa
44#
發(fā)表于 2025-3-29 06:46:46 | 只看該作者
Multilingual Speaker Identification with the Constraint of Limited Data Using Multitaper MFCCultitaper Mel-frequency cepstral coefficient (multitaper MFCC) features for Multilingual speaker identification with the constraint of limited data. The speaker identification study is conducted using 30 speakers of our own database. Sine-weighted cepstrum estimator (SWCE) taper MFCC features are ex
45#
發(fā)表于 2025-3-29 10:15:18 | 只看該作者
Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Usination of simultaneous/concurrent multiple groups in the Secure Group Communication model with overlapping memberships. Designing a secure key management scheme with efficient rekeying process in this scenario is a challenging task. We design an efficient secure group key management scheme for simult
46#
發(fā)表于 2025-3-29 15:26:31 | 只看該作者
47#
發(fā)表于 2025-3-29 18:07:41 | 只看該作者
Simulation and Evaluation of Different Mobility Models in Ad-Hoc Sensor Network over DSR Protocol Usis used for evaluation of wireless networks. WSN is Multi-hop Self-configuring and consists of sensor nodes. The movements of nodes are like the patterns which can be classified into different mobility models and each of them have been characterized by its own distinctive features and also plays an
48#
發(fā)表于 2025-3-29 21:11:29 | 只看該作者
Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functionsguarding against attempts to establish fraudulent multiple identities or prevent identity fraud. The greatest advantage that the biometric data of an individual remains constant acts as its biggest liability. Once the attacker gets biometric password of an individual then security of his data become
49#
發(fā)表于 2025-3-30 03:08:08 | 只看該作者
50#
發(fā)表于 2025-3-30 05:09:05 | 只看該作者
A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacksthis context, smart card industries try to overcome the anomaly by implementing various countermeasures. In this paper we discuss and present a powerful attack based on the vulnerability of the linker which could change the correct byte code into malicious one. During the attack, the linker interpre
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-23 19:05
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
英德市| 井冈山市| 兴安县| 时尚| 新丰县| 祁门县| 光山县| 搜索| 介休市| 海安县| 永嘉县| 德惠市| 大安市| 策勒县| 新巴尔虎右旗| 郴州市| 夏津县| 元氏县| 遵义县| 胶南市| 交城县| 河池市| 林甸县| 洛南县| 陆川县| 依安县| 金川县| 阳高县| 庆云县| 义马市| 白水县| 鄂托克旗| 和龙市| 琼海市| 象州县| 邛崃市| 黄龙县| 湖南省| 邵东县| 彭泽县| 松原市|