找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Recent Trends in Computer Networks and Distributed Systems Security; Second International Gregorio Martínez Pérez,Sabu M. Thampi,Lei Shu Co

[復(fù)制鏈接]
樓主: 愚蠢地活
31#
發(fā)表于 2025-3-26 22:19:17 | 只看該作者
32#
發(fā)表于 2025-3-27 03:16:33 | 只看該作者
Palmprint Recognition Using Fusion of 2D-Gabor and 2D Log-Gabor Featuresiae points, texture, ridges etc. Several line and texture extraction techniques for palmprint have been extensively studied. This paper presents an intra-modal authentication system based on texture information extracted from the palmprint using the 2D- Gabor and 2D-Log Gabor filters. An individual
33#
發(fā)表于 2025-3-27 05:41:12 | 只看該作者
A New Variant of Algebraic Attackuce the degree of the algebraic equations as much as possible in order to obtain a lower time complexity. This paper presents one such means of obtaining low degree equations using the decomposition of Boolean functions. This method overcomes the two major drawbacks of fast algebraic attack. We have
34#
發(fā)表于 2025-3-27 10:05:26 | 只看該作者
Enhanced Security of PHR System in Cloud Using Prioritized Level Based Encryptiond for categorizing the data based on the sensitivity level of the health records, since encrypting all the records using the same mechanism will not be fair and also paves the way for intruders to decrypt all the records if the algorithm is found. To achieve fine-grained and scalable data control fo
35#
發(fā)表于 2025-3-27 13:49:49 | 只看該作者
Clustering Based Routing Strategies for Energy Management in Ad-Hoc Networksts provide comparative performance analysis of RE-CBRP, MC-CBRP, existing CBRP and Dynamic Source Routing (DSR) protocols. Results demonstrate that the network can be efficiently optimized with respect to energy using the RE-CBRP and MC-CBRP as compared to CBRP and DSR.
36#
發(fā)表于 2025-3-27 19:53:43 | 只看該作者
37#
發(fā)表于 2025-3-27 21:55:59 | 只看該作者
A Genetic Algorithm for Scheduling Workflow Applications in Unreliable Cloud Environmentmization genetic algorithm has been proposed which reduces the failure rate and makespan of workflow applications. It allocates those resources to workflow application which are reliable and cost of execution is under user budget. The performance of genetic algorithm has been compared with max-min a
38#
發(fā)表于 2025-3-28 05:02:55 | 只看該作者
Autonomic SLA Management in Cloud Computing Serviceswill really help to limit the over provisioning of resources and thus leads to the optimum usage of resources. As a consolidation the proposed architecture may yield maximized Business Level Objectives (BLOs) to the cloud providers.
39#
發(fā)表于 2025-3-28 08:11:53 | 只看該作者
A Novel Audio Watermark Embedding and Extraction Method Based on Compressive Sensing, Sinusoidal Codusing sinusoidal speech coding bases and compressive sensing measurement matrix. Experimental results show that proposed method provide exact recovery of watermark information and host signal under noisy attacks.
40#
發(fā)表于 2025-3-28 11:19:48 | 只看該作者
Cryptanalysis of Two Authentication Scheme for DRM Systeming biometric keys in which user and server can mutually authenticate each other. We analyze both the schemes and show that both the schemes fail to prove their claim of resistance to most common attacks. Fan et al.’s scheme has failed to resist known session specific temporary information attack an
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-13 09:11
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
平定县| 兴业县| 台北县| 桦甸市| 石屏县| 黄骅市| 南靖县| 昌平区| 佛学| 东丽区| 镇赉县| 黑河市| 绥芬河市| 辽源市| 长治县| 通城县| 颍上县| 喀喇| 枣庄市| 任丘市| 信宜市| 天长市| 积石山| 桑植县| 融水| 临海市| 大姚县| 内丘县| 鄱阳县| 巧家县| 广灵县| 福海县| 三明市| 红安县| 恭城| 图木舒克市| 哈尔滨市| 泗洪县| 桦南县| 灯塔市| 辽阳县|