找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Recent Trends in Computer Networks and Distributed Systems Security; Second International Gregorio Martínez Pérez,Sabu M. Thampi,Lei Shu Co

[復(fù)制鏈接]
樓主: 愚蠢地活
31#
發(fā)表于 2025-3-26 22:19:17 | 只看該作者
32#
發(fā)表于 2025-3-27 03:16:33 | 只看該作者
Palmprint Recognition Using Fusion of 2D-Gabor and 2D Log-Gabor Featuresiae points, texture, ridges etc. Several line and texture extraction techniques for palmprint have been extensively studied. This paper presents an intra-modal authentication system based on texture information extracted from the palmprint using the 2D- Gabor and 2D-Log Gabor filters. An individual
33#
發(fā)表于 2025-3-27 05:41:12 | 只看該作者
A New Variant of Algebraic Attackuce the degree of the algebraic equations as much as possible in order to obtain a lower time complexity. This paper presents one such means of obtaining low degree equations using the decomposition of Boolean functions. This method overcomes the two major drawbacks of fast algebraic attack. We have
34#
發(fā)表于 2025-3-27 10:05:26 | 只看該作者
Enhanced Security of PHR System in Cloud Using Prioritized Level Based Encryptiond for categorizing the data based on the sensitivity level of the health records, since encrypting all the records using the same mechanism will not be fair and also paves the way for intruders to decrypt all the records if the algorithm is found. To achieve fine-grained and scalable data control fo
35#
發(fā)表于 2025-3-27 13:49:49 | 只看該作者
Clustering Based Routing Strategies for Energy Management in Ad-Hoc Networksts provide comparative performance analysis of RE-CBRP, MC-CBRP, existing CBRP and Dynamic Source Routing (DSR) protocols. Results demonstrate that the network can be efficiently optimized with respect to energy using the RE-CBRP and MC-CBRP as compared to CBRP and DSR.
36#
發(fā)表于 2025-3-27 19:53:43 | 只看該作者
37#
發(fā)表于 2025-3-27 21:55:59 | 只看該作者
A Genetic Algorithm for Scheduling Workflow Applications in Unreliable Cloud Environmentmization genetic algorithm has been proposed which reduces the failure rate and makespan of workflow applications. It allocates those resources to workflow application which are reliable and cost of execution is under user budget. The performance of genetic algorithm has been compared with max-min a
38#
發(fā)表于 2025-3-28 05:02:55 | 只看該作者
Autonomic SLA Management in Cloud Computing Serviceswill really help to limit the over provisioning of resources and thus leads to the optimum usage of resources. As a consolidation the proposed architecture may yield maximized Business Level Objectives (BLOs) to the cloud providers.
39#
發(fā)表于 2025-3-28 08:11:53 | 只看該作者
A Novel Audio Watermark Embedding and Extraction Method Based on Compressive Sensing, Sinusoidal Codusing sinusoidal speech coding bases and compressive sensing measurement matrix. Experimental results show that proposed method provide exact recovery of watermark information and host signal under noisy attacks.
40#
發(fā)表于 2025-3-28 11:19:48 | 只看該作者
Cryptanalysis of Two Authentication Scheme for DRM Systeming biometric keys in which user and server can mutually authenticate each other. We analyze both the schemes and show that both the schemes fail to prove their claim of resistance to most common attacks. Fan et al.’s scheme has failed to resist known session specific temporary information attack an
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-13 09:11
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
翁牛特旗| 大宁县| 宜宾县| 松溪县| 永嘉县| 福清市| 砚山县| 田阳县| 临颍县| 辽宁省| 石楼县| 大足县| 龙泉市| 博湖县| 纳雍县| 凌海市| 平武县| 盐山县| 大新县| 宝鸡市| 沁水县| 涪陵区| 玉田县| 桑植县| 客服| 龙川县| 台北市| 平度市| 策勒县| 广丰县| 资中县| 双柏县| 清水县| 鸡东县| 平邑县| 登封市| 东阳市| 双流县| 隆安县| 连江县| 亚东县|