找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Applications and Techniques in Information Security; 6th International Co Wenjia Niu,Gang Li,Lynn Batten Conference proceedings 2015 Spring

[復(fù)制鏈接]
樓主: necrosis
11#
發(fā)表于 2025-3-23 11:49:16 | 只看該作者
A Lightweight Code-Based Authentication Protocol for RFID Systems so on. With the widespread adoption of RFID, the security and privacy issues of RFID systems are drawing more and more attention. In this paper, we propose a lightweight mutual authentication protocol based on error correction code for RFID systems with constant authentication time. Further analysi
12#
發(fā)表于 2025-3-23 16:53:49 | 只看該作者
13#
發(fā)表于 2025-3-23 20:01:27 | 只看該作者
Structural Analysis of IWA Social Networkonsible comments or articles. While most of related work focused on how to detect IWA using a classifier, there is a lack of analysis about the distribution and behavior characteristics of the special group. To address this issue, this paper constructs an IWA social network in which IWAs are core no
14#
發(fā)表于 2025-3-23 22:20:11 | 只看該作者
A Differentially Private Method for Reward-Based Spatial Crowdsourcingsolution requires the workers send their locations to a centralized server, which leads to a privacy threat. One of the key challenges of spatial crowdsourcing is to maximize the number of assigned tasks with workers’ location privacy preserved. In this paper, we focus on the reward-based spatial cr
15#
發(fā)表于 2025-3-24 05:33:35 | 只看該作者
Do Applications Perform Its Original Design? A Preliminary Analysis from Internet Big Dataer TCP. Every application layer protocol is designed to perform a specific purpose, for example File Transfer Protocol (FTP) is designed for file transfer. Therefore every application layer protocol has different performance expectations. In this paper, we try to observe that whether characteristics
16#
發(fā)表于 2025-3-24 09:38:56 | 只看該作者
Trust Prediction with Trust Antecedent Framework Regularizationintegrative and well-known model in management science, which takes ability, benevolence and integrity as three key factors to explain how trust relations are established between a trustor and a trustee. In this paper, we propose a new trust prediction model based on Trust Antecedent framework (TA)
17#
發(fā)表于 2025-3-24 11:08:33 | 只看該作者
18#
發(fā)表于 2025-3-24 15:33:34 | 只看該作者
19#
發(fā)表于 2025-3-24 21:27:27 | 只看該作者
A Differentially Private Method for Reward-Based Spatial Crowdsourcingowdsourcing and propose a two-stage method which consists of constructing a differentially private contour plot followed by task assignment with optimized-reward allocation. Experiments on real dataset demonstrate the availability of the proposed method.
20#
發(fā)表于 2025-3-25 00:35:26 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-13 04:13
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
临沧市| 宣武区| 方正县| 玉林市| 陇川县| 马鞍山市| 利川市| 南部县| 诸城市| 开封县| 海淀区| 驻马店市| 周宁县| 望谟县| 即墨市| 昌平区| 日土县| 萍乡市| 色达县| 密山市| 宜昌市| 都兰县| 瑞金市| 高台县| 呼伦贝尔市| 南安市| 罗城| 兰溪市| 龙陵县| 白银市| 苍山县| 岳池县| 若羌县| 铁力市| 漳州市| 云浮市| 康乐县| 河西区| 东光县| 扶风县| 皮山县|