找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Applications and Techniques in Information Security; 6th International Co Wenjia Niu,Gang Li,Lynn Batten Conference proceedings 2015 Spring

[復(fù)制鏈接]
樓主: necrosis
11#
發(fā)表于 2025-3-23 11:49:16 | 只看該作者
A Lightweight Code-Based Authentication Protocol for RFID Systems so on. With the widespread adoption of RFID, the security and privacy issues of RFID systems are drawing more and more attention. In this paper, we propose a lightweight mutual authentication protocol based on error correction code for RFID systems with constant authentication time. Further analysi
12#
發(fā)表于 2025-3-23 16:53:49 | 只看該作者
13#
發(fā)表于 2025-3-23 20:01:27 | 只看該作者
Structural Analysis of IWA Social Networkonsible comments or articles. While most of related work focused on how to detect IWA using a classifier, there is a lack of analysis about the distribution and behavior characteristics of the special group. To address this issue, this paper constructs an IWA social network in which IWAs are core no
14#
發(fā)表于 2025-3-23 22:20:11 | 只看該作者
A Differentially Private Method for Reward-Based Spatial Crowdsourcingsolution requires the workers send their locations to a centralized server, which leads to a privacy threat. One of the key challenges of spatial crowdsourcing is to maximize the number of assigned tasks with workers’ location privacy preserved. In this paper, we focus on the reward-based spatial cr
15#
發(fā)表于 2025-3-24 05:33:35 | 只看該作者
Do Applications Perform Its Original Design? A Preliminary Analysis from Internet Big Dataer TCP. Every application layer protocol is designed to perform a specific purpose, for example File Transfer Protocol (FTP) is designed for file transfer. Therefore every application layer protocol has different performance expectations. In this paper, we try to observe that whether characteristics
16#
發(fā)表于 2025-3-24 09:38:56 | 只看該作者
Trust Prediction with Trust Antecedent Framework Regularizationintegrative and well-known model in management science, which takes ability, benevolence and integrity as three key factors to explain how trust relations are established between a trustor and a trustee. In this paper, we propose a new trust prediction model based on Trust Antecedent framework (TA)
17#
發(fā)表于 2025-3-24 11:08:33 | 只看該作者
18#
發(fā)表于 2025-3-24 15:33:34 | 只看該作者
19#
發(fā)表于 2025-3-24 21:27:27 | 只看該作者
A Differentially Private Method for Reward-Based Spatial Crowdsourcingowdsourcing and propose a two-stage method which consists of constructing a differentially private contour plot followed by task assignment with optimized-reward allocation. Experiments on real dataset demonstrate the availability of the proposed method.
20#
發(fā)表于 2025-3-25 00:35:26 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-13 06:05
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
多伦县| 正阳县| 时尚| 长海县| 郓城县| 温州市| 偃师市| 南和县| 瓦房店市| 禄劝| 中西区| 怀化市| 西乌| 平和县| 洛浦县| 竹山县| 城口县| 永定县| 库尔勒市| 清丰县| 理塘县| 永和县| 金乡县| 河津市| 炎陵县| 漳州市| 武平县| 营口市| 汝城县| 寿宁县| 上饶市| 临湘市| 祁门县| 新龙县| 梧州市| 延安市| 贵德县| 精河县| 凉山| 汪清县| 调兵山市|