找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Recent Trends in Computer Networks and Distributed Systems Security; International Confer Sabu M. Thampi,Albert Y. Zomaya,Tony Thomas Confe

[復(fù)制鏈接]
樓主: intrinsic
41#
發(fā)表于 2025-3-28 17:53:23 | 只看該作者
42#
發(fā)表于 2025-3-28 19:20:49 | 只看該作者
Imperceptible Image Indexing Using Digital Watermarkingtermarking is less sensitive to HVS (Human Visual System). Edge detectors are used to estimate regions in the image where intensity changes rapidly. Modifications to such pixel will not attract the attention of human eyes. Watermark is thus integrated imperceptibly into the digital images. The propo
43#
發(fā)表于 2025-3-29 01:12:47 | 只看該作者
A New Deterministic Algorithm for Testing Primality Based on a New Property of Prime Numbersyields all of the prime numbers and no composites. Due to this uncertainty surrounding the theory of prime numbers, popular algorithms proposed in literature till date, rely heavily on probabilistic methods to determine primality. The paper proposes a new theory on the nature of prime numbers. In pa
44#
發(fā)表于 2025-3-29 06:46:46 | 只看該作者
Multilingual Speaker Identification with the Constraint of Limited Data Using Multitaper MFCCultitaper Mel-frequency cepstral coefficient (multitaper MFCC) features for Multilingual speaker identification with the constraint of limited data. The speaker identification study is conducted using 30 speakers of our own database. Sine-weighted cepstrum estimator (SWCE) taper MFCC features are ex
45#
發(fā)表于 2025-3-29 10:15:18 | 只看該作者
Secure Group Key Management Scheme for Simultaneous Multiple Groups with Overlapped Memberships Usination of simultaneous/concurrent multiple groups in the Secure Group Communication model with overlapping memberships. Designing a secure key management scheme with efficient rekeying process in this scenario is a challenging task. We design an efficient secure group key management scheme for simult
46#
發(fā)表于 2025-3-29 15:26:31 | 只看該作者
47#
發(fā)表于 2025-3-29 18:07:41 | 只看該作者
Simulation and Evaluation of Different Mobility Models in Ad-Hoc Sensor Network over DSR Protocol Usis used for evaluation of wireless networks. WSN is Multi-hop Self-configuring and consists of sensor nodes. The movements of nodes are like the patterns which can be classified into different mobility models and each of them have been characterized by its own distinctive features and also plays an
48#
發(fā)表于 2025-3-29 21:11:29 | 只看該作者
Secure Authentication in Multimodal Biometric Systems Using Cryptographic Hash Functionsguarding against attempts to establish fraudulent multiple identities or prevent identity fraud. The greatest advantage that the biometric data of an individual remains constant acts as its biggest liability. Once the attacker gets biometric password of an individual then security of his data become
49#
發(fā)表于 2025-3-30 03:08:08 | 只看該作者
50#
發(fā)表于 2025-3-30 05:09:05 | 只看該作者
A Dynamic Syntax Interpretation for Java Based Smart Card to Mitigate Logical Attacksthis context, smart card industries try to overcome the anomaly by implementing various countermeasures. In this paper we discuss and present a powerful attack based on the vulnerability of the linker which could change the correct byte code into malicious one. During the attack, the linker interpre
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-23 13:25
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
德令哈市| 唐海县| 泸水县| 乌苏市| 新绛县| 民县| 惠东县| 遂溪县| 博爱县| 浏阳市| 华亭县| 凯里市| 山阴县| 兰坪| 社旗县| 和平县| 扎囊县| 报价| 琼结县| 鲜城| 汝南县| 阿鲁科尔沁旗| 基隆市| 绥德县| 昭苏县| 邓州市| 克山县| 潜山县| 台山市| 新野县| 大邑县| 永嘉县| 同心县| 板桥市| 十堰市| 石屏县| 太湖县| 洪洞县| 章丘市| 大邑县| 广饶县|