標(biāo)題: Titlebook: Information Security; 14th International C Xuejia Lai,Jianying Zhou,Hui Li Conference proceedings 2011 Springer-Verlag GmbH Berlin Heidelbe [打印本頁] 作者: 哄笑 時間: 2025-3-21 17:41
書目名稱Information Security影響因子(影響力)
書目名稱Information Security影響因子(影響力)學(xué)科排名
書目名稱Information Security網(wǎng)絡(luò)公開度
書目名稱Information Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Security被引頻次
書目名稱Information Security被引頻次學(xué)科排名
書目名稱Information Security年度引用
書目名稱Information Security年度引用學(xué)科排名
書目名稱Information Security讀者反饋
書目名稱Information Security讀者反饋學(xué)科排名
作者: Instantaneous 時間: 2025-3-21 21:38 作者: 充足 時間: 2025-3-22 02:26
A Formal Approach to Distance-Bounding RFID Protocolsy are independent. Finally we assess the security of the RFID distance-bounding scheme due to Kim and Avoine in our model, and enhance it to include impersonation security and allow for errors due to noisy channel transmissions.作者: DALLY 時間: 2025-3-22 04:39 作者: 萬靈丹 時間: 2025-3-22 11:12
RatBot: Anti-enume,ion Peer-to-Peer BotnetsBot, a P2P botnet that is able to defeat existing botnet enumeration methods. The key idea of RatBot is the existence of a fraction of bots that are indistinguishable from their fake identities. RatBot prevents adversaries from inferring its size even after its executables are fully exposed. To stud作者: SOW 時間: 2025-3-22 14:40
Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashesms. A close distance between the hash digest of flow . and a known SPIT suggests that flow . probably belongs the same bulk of the known SPIT. Finally, we also experimentally study the detection performance of the hash algorithms.作者: 出處 時間: 2025-3-22 20:54 作者: 油膏 時間: 2025-3-22 21:22 作者: Spartan 時間: 2025-3-23 05:02
Shinsaku Kiyomoto,Matt Henricksen,Wun-She Yap,Yuto Nakano,Kazuhide Fukushima作者: 冥界三河 時間: 2025-3-23 07:53 作者: Alopecia-Areata 時間: 2025-3-23 20:56 作者: 吹牛大王 時間: 2025-3-24 01:48 作者: Arresting 時間: 2025-3-24 05:05
Ge Zhang,Simone Fischer-Hübner correspond to the past, present, and future), we introduce noncanonical (i.e., nonfunctorial) mnemonic morphisms among the three states of p defined over ., ., and ., respectively. Then we study the interplay among conscious states ., . and . of . corresponding to the past, present, and future.作者: 比目魚 時間: 2025-3-24 08:02
Hui Fang,Yongdong Wu,Shuhong Wang,Yin Huang correspond to the past, present, and future), we introduce noncanonical (i.e., nonfunctorial) mnemonic morphisms among the three states of p defined over ., ., and ., respectively. Then we study the interplay among conscious states ., . and . of . corresponding to the past, present, and future.作者: intention 時間: 2025-3-24 13:31 作者: opportune 時間: 2025-3-24 14:50
Georgios Kontaxis,Michalis Polychronakis,Evangelos P. Markatosictory issues can become totally understandable, as they can be integrated into a single coherent framework. This is the integrationist approach in contrast to the reductionist approach. Situations of this kind are truly relevant to understanding the question, “What are creative complex systems?” Th作者: 假裝是你 時間: 2025-3-24 20:39
Francesco Gadaleta,Nick Nikiforakis,Yves Younan,Wouter Joosennal waves of extinction in complex natural systems (Pimm, 1991). For example, the decline of elephants in South Africa has resulted in forestation of large areas of savannah habitat, a process which may lead to the localized extinction of several species of grazing herbivores (Owen-Smith, 1989). The作者: 希望 時間: 2025-3-25 01:10 作者: HARD 時間: 2025-3-25 05:06
Joachim Biskup,Marcel Preu?,Lena Wiesely increased rates of locomotion, exploration and foraging behaviour which corresponded with reductions in the levels of stereo-typed behaviour (Shepherdson, Brownback and Tinkler, 1990). These and other successful techniques share an important characteristic: they restore to the captive animal the 作者: 大火 時間: 2025-3-25 11:31 作者: Nucleate 時間: 2025-3-25 12:58
Sha Ma,Bo Yang,Kangshun Li,Feng Xiaife health and disease, restoration ecology, reintroduction management and environmental economics. Such applications in turn benefit from close cooperation between university-based researchers and managers of endangered species in zoos and reserves. Only in exceptional cases do zoos or reserves hav作者: CURB 時間: 2025-3-25 16:41 作者: 吹牛需要藝術(shù) 時間: 2025-3-25 23:53 作者: 領(lǐng)巾 時間: 2025-3-26 03:46
How to Find Short RC4 Colliding Key Pairsciple that how the two different keys can achieve a collision is well known by investigating the key scheduling algorithm of RC4. However, how to find those colliding key pairs is a different story, which has been largely remained unexploited. Previous researches have demonstrated that finding colli作者: Feature 時間: 2025-3-26 06:52 作者: 痛苦一下 時間: 2025-3-26 12:00 作者: 直覺好 時間: 2025-3-26 13:38
Toward Pairing-Free Certificateless Authenticated Key Exchangesarty. Unfortunately, these advantages are partially counteracted in most CL-AKE protocols which require expensive pairing operations. This paper proposes a new CL-AKE protocol without requiring any pairing operation during the protocol execution, although a pairing map may be required to realize a D作者: 黃油沒有 時間: 2025-3-26 18:47
Security Analysis of an RSA Key Generation Algorithm with a Large Private Keyed secure. In this paper, we propose an attack on Encinas-Masqué-Dios algorithm and find its security flaw. Firstly, we prove that Encinas-Masqué-Dios algorithm is totally insecure when the public exponent . is larger than the sum of the two primes . and .. Secondly, we show that when . is larger th作者: 克制 時間: 2025-3-26 21:36
Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryptryption (IBE), respectively. It seems natural that there is a close relationship between TRE and PEKS. However, no explicit bridge has been shown between TRE and PEKS so far. In this paper, we show that TRE can be generically constructed by PEKS with extended functionalities, called secure-channel f作者: MULTI 時間: 2025-3-27 02:45
The ,-Diffie-Hellman Problem and Its Applicationsnded to the .-Diffie-Hellman (.-DH) problem for an arbitrary integer ., and this new problem is shown to be at least as hard as the ordinary DH problem. Like the twin DH problem, the .-DH problem remains hard even in the presence of a decision oracle that recognizes solution to the problem. On the o作者: onlooker 時間: 2025-3-27 06:48 作者: WAG 時間: 2025-3-27 11:45 作者: 圖表證明 時間: 2025-3-27 17:17 作者: 信條 時間: 2025-3-27 21:19
Detection and Analysis of Cryptographic Data Inside Softwareoutput data and intermediated states of operation) is important to security analysis. However, various implementations of cryptographic algorithms lead the automatic detection and analysis to be very hard. This paper proposes a novel automatic cryptographic data detection and analysis approach. This作者: DENT 時間: 2025-3-28 01:28
: Minimizing Information Disclosure to Third Parties in Single Sign-on Platformsail identity, or personalize their browsing experience through a set of plug-ins that interact with the users’ social profile. Research results suggest that more than two million Web sites have already adopted Facebook’s social plug-ins, and the number is increasing sharply. Although one might theor作者: harbinger 時間: 2025-3-28 05:03
Hello rootKitty: A Lightweight Invariance-Enforcing Frameworkng on a host. A successful attack against an operating system’s kernel means a total and complete compromise of the running system. These attacks usually end with the installation of a rootkit, a stealthy piece of software running with kernel privileges. When a rootkit is present, no guarantees can 作者: GRIN 時間: 2025-3-28 08:38
On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraintsity by vertical fragmentation and without relying on encryption. Although prohibiting unauthorised (direct) accesses to confidential information, this approach has so far ignored the fact that attackers might infer sensitive information logically by deduction. In this article vertical fragmentation 作者: prediabetes 時間: 2025-3-28 11:12
Round-Efficient Oblivious Database Manipulationr, data manipulation in such databases can be slow and cumbersome without dedicated protocols for certain database operations. In this paper, we provide efficient protocols for oblivious selection, filtering and shuffle—essential tools in privacy-preserving data analysis. As the first contribution, 作者: anaphylaxis 時間: 2025-3-28 16:04 作者: 字形刻痕 時間: 2025-3-28 21:45 作者: 金絲雀 時間: 2025-3-29 00:16 作者: NEXUS 時間: 2025-3-29 04:30
Aggelos Kiayias,Serdar Pehlivanoglucal model based on student creativity. They also gave participating teachers the information that they needed to develop the third stage of our research, which we will describe throughout the next chapters. According to our model, all creative collaboration should be supported by class discussion. O作者: 采納 時間: 2025-3-29 07:57
Jiageng Chen,Atsuko Miyajical model based on student creativity. They also gave participating teachers the information that they needed to develop the third stage of our research, which we will describe throughout the next chapters. According to our model, all creative collaboration should be supported by class discussion. O作者: 忘恩負義的人 時間: 2025-3-29 11:41 作者: 斗爭 時間: 2025-3-29 18:01 作者: 密切關(guān)系 時間: 2025-3-29 21:12 作者: 詢問 時間: 2025-3-30 00:41
Ge Zhang,Simone Fischer-Hübnernt, and future in terms of nonfunctorially induced mnemonic morphisms. The past is recalled by memories, and the future?consists of possible states?with a probability space of possibilities. When our present?consciousness and behavior change, through our memory our interpretation of the past changes作者: 故意 時間: 2025-3-30 06:44 作者: 使堅硬 時間: 2025-3-30 11:21 作者: 知識 時間: 2025-3-30 14:33
Georgios Kontaxis,Michalis Polychronakis,Evangelos P. Markatosization brings about benefits, but it can increase the potential risks of “systemic problems”, leading to system-wide disruptions. The coronavirus pandemic, declared on March 11, 2020, by the World Health Organization, has revealed social disparities in the form of a higher risk of death for people 作者: Ledger 時間: 2025-3-30 17:40 作者: 啤酒 時間: 2025-3-30 21:17
Moritz Y. Becker,Masoud Koleiniewalski’s horse (.), Père David’s deer (.), Hawaiian goose (.) and a number of others would no longer exist but for the fact that their populations were maintained and propagated for many decades in captivity. However, the concept that zoos could serve the goal of preserving biological species throu作者: Trabeculoplasty 時間: 2025-3-31 01:10 作者: Spinous-Process 時間: 2025-3-31 07:26
Sven Laur,Jan Willemson,Bingsheng Zhangewalski’s horse (.), Père David’s deer (.), Hawaiian goose (.) and a number of others would no longer exist but for the fact that their populations were maintained and propagated for many decades in captivity. However, the concept that zoos could serve the goal of preserving biological species throu作者: 最小 時間: 2025-3-31 11:55
Sha Ma,Bo Yang,Kangshun Li,Feng Xian so far-reaching that there is now a continuous spectrum extending from limited groups of animals maintained in small enclosures through a range of intermediate conditions to free-living populations in relatively undisturbed environments. In all cases, at least some degree of management is now nece作者: 缺陷 時間: 2025-3-31 14:43
978-3-642-24860-3Springer-Verlag GmbH Berlin Heidelberg 2011作者: amyloid 時間: 2025-3-31 20:44 作者: 性別 時間: 2025-4-1 01:18
Opacity Analysis in Trust Management SystemsTrust management systems are vulnerable to so-called probing attacks, which enable an adversary to gain knowledge about confidential facts in the system. We present the first method for deciding if an adversary can gain knowledge about confidential information in a Datalog-based policy.作者: 單色 時間: 2025-4-1 03:49
Conference proceedings 2011r 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.作者: Inertia 時間: 2025-4-1 07:17 作者: Haphazard 時間: 2025-4-1 10:34 作者: ERUPT 時間: 2025-4-1 16:42
https://doi.org/10.1007/978-3-642-24861-0browser security; hash function; key generation algorithm; multiple identity-based encryption; virtualiz作者: 確保 時間: 2025-4-1 19:55 作者: emulsify 時間: 2025-4-2 00:43 作者: 西瓜 時間: 2025-4-2 06:24 作者: Accolade 時間: 2025-4-2 09:00
0302-9743 elected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.978-3-642-24860-3978-3-642-24861-0Series ISSN 0302-9743 Series E-ISSN 1611-3349