Keywords: حمله مخفی; CMR; colluding malicious resource; PGTF; probability of the genuine task failure; RMS; resource management system; Collusion attack; Grid computing; Optimization; Spot-checking;
مقالات ISI حمله مخفی (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: حمله مخفی; Multicast communication; Group key management; Collusion attack; Vulnerability analysis; One-way function tree
Keywords: حمله مخفی; Fingerprinting; Quaternions; Joint fingerprinting and decryption; Collusion attack; Traitor tracing
Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia
Keywords: حمله مخفی; Fingerprinting; Multimedia distribution; Joint fingerprinting and decryption; Collusion attack; Traitor tracing
One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks
Keywords: حمله مخفی; Wireless sensor networks; Key management; Group key distribution; Self-healing; Collusion attack
Server-aided signatures verification secure against collusion attack
Keywords: حمله مخفی; Server-aided computation; Collusion attack; Signatures; Pairings; Delegation; Weak computational device
A collusion attack optimization framework toward spread-spectrum fingerprinting
Keywords: حمله مخفی; Digital fingerprinting; Collusion attack; Optimization framework; Closed-loop feedback control theory
A novel acknowledgment-based approach against collude attacks in MANET
Keywords: حمله مخفی; Collusion attack; Timestamp; Mobile Ad hoc networks
Insight into collusion attacks in random-grid-based visual secret sharing
Keywords: حمله مخفی; Visual secret sharing; Collusion attack; Cheating problem; Random grids
Authenticated public key broadcast encryption scheme secure against insiders’ attack
Keywords: حمله مخفی; Broadcast encryption; Sender authentication; Insiders’ attack; Collusion attack; Identity-based encryption
A novel fingerprinting algorithm with blind detection in DCT domain for images
Keywords: حمله مخفی; Fingerprinting; Blind detection; Quantization; Collusion attack
AACS-compatible multimedia joint encryption and fingerprinting: Security issues and some solutions
Keywords: حمله مخفی; AACS; Collusion attack; (Selective) multimedia encryption; Multimedia fingerprinting; Perceptual security; Rewritable fingerprint embedding
Enforcing the security of a time-bound hierarchical key assignment scheme
Keywords: حمله مخفی; Access control; Key assignment; Collusion attack
Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack
Keywords: حمله مخفی; Digital signature; Proxy signature; Threshold proxy signature; Collusion attack;