募捐 9月15日2024 – 10月1日2024
关于筹款
书籍搜索
书
募捐:
29.2% 达到
登录
登录
访问更多功能
个人推荐
Telegram自动程序
下载历史
发送到电子邮件或 Kindle
管理书单
保存到收藏夹
个人的
书籍请求
探索
Z-Recommend
书单
最受欢迎
种类
贡献
捐款
上载
Litera Library
捐赠纸质书籍
添加纸质书籍
Search paper books
我的 LITERA Point
搜索关键词
Main
搜索关键词
search
1
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings
Springer-Verlag Berlin Heidelberg
Ton van Deursen
,
Sjouke Mauw
,
Saša Radomirović (auth.)
,
Jose A. Onieva
,
Damien Sauveron
,
Serge Chaumette
,
Dieter Gollmann
,
Konstantinos Markantonakis (eds.)
security
protocol
authentication
network
adversary
capability
node
attacks
key
capabilities
analysis
routing
algorithm
random
nodes
protocols
systems
detection
lncs
correlation
different
wlan
probability
springer
heidelberg
ctx
networks
identification
brip
lookup
monitor
eap
first
algorithms
architecture
alert
answers
packet
rfid
step
correct
independent
traffic
untraceability
require
transcripts
attacker
dht
secure
signature
年:
2008
语言:
english
文件:
PDF, 4.09 MB
您的标签:
0
/
0
english, 2008
2
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks: Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings
Springer-Verlag Berlin Heidelberg
Ton van Deursen
,
Sjouke Mauw
,
Saša Radomirović (auth.)
,
Jose A. Onieva
,
Damien Sauveron
,
Serge Chaumette
,
Dieter Gollmann
,
Konstantinos Markantonakis (eds.)
security
protocol
authentication
network
adversary
capability
node
attacks
key
capabilities
analysis
routing
algorithm
random
nodes
protocols
systems
detection
lncs
correlation
different
wlan
probability
springer
heidelberg
ctx
networks
identification
brip
lookup
monitor
eap
first
algorithms
architecture
alert
answers
packet
rfid
step
correct
independent
traffic
untraceability
require
transcripts
attacker
dht
secure
signature
年:
2008
语言:
english
文件:
PDF, 2.86 MB
您的标签:
0
/
0
english, 2008
3
A Traceability Analysis of Monero's Blockchain
Amrit Kumar
,
Clément Fischer
,
Shruti Tople & Prateek Saxena
mix
input
transaction
inputs
heuristic
monero
key
outputs
keys
output
transactions
ringcts
traceable
figure
anonymity
percentage
txo
analysis
presents
traceability
height
identified
privacy
destination
users
probability
values
positive
signature
ringct
attacks
corresponding
effective
shows
alice
observe
algorithm
average
effect
cascade
dataset
false
impact
moreover
april
axis
frequency
function
network
redeemed
语言:
english
文件:
PDF, 2.51 MB
您的标签:
0
/
5.0
english
1
按照
此链接
或在 Telegram 上找到“@BotFather”机器人
2
发送 /newbot 命令
3
为您的聊天机器人指定一个名称
4
为机器人选择一个用户名
5
从 BotFather 复制完整的最后一条消息并将其粘贴到此处
×
×