標(biāo)題: Titlebook: Information Security; 10th International C Juan A. Garay,Arjen K. Lenstra,René Peralta Conference proceedings 2007 Springer-Verlag Berlin H [打印本頁] 作者: 大口水罐 時間: 2025-3-21 18:47
書目名稱Information Security影響因子(影響力)
書目名稱Information Security影響因子(影響力)學(xué)科排名
書目名稱Information Security網(wǎng)絡(luò)公開度
書目名稱Information Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Security被引頻次
書目名稱Information Security被引頻次學(xué)科排名
書目名稱Information Security年度引用
書目名稱Information Security年度引用學(xué)科排名
書目名稱Information Security讀者反饋
書目名稱Information Security讀者反饋學(xué)科排名
作者: 策略 時間: 2025-3-22 00:11
Impossible-Differential Attacks on Large-Block Rijndaelprovide larger internal states when used as primitives for the construction of stream ciphers and hash functions. The main contributions of this paper are longer ID distinguishers found for large-block Rijndael versions, compared to the ones used for the AES.作者: 讓步 時間: 2025-3-22 00:31 作者: DEMUR 時間: 2025-3-22 04:43 作者: 靦腆 時間: 2025-3-22 11:21
Identity-Based Proxy Re-encryption Without Random Oraclesemes, which are both proved secure in the standard model. The first one is efficient in both computation and ciphertext length, and the other one achieves chosen-ciphertext security. Our solutions answer the open problems left in the previous work.作者: abduction 時間: 2025-3-22 13:56 作者: insurrection 時間: 2025-3-22 21:07 作者: violate 時間: 2025-3-22 22:38 作者: 捐助 時間: 2025-3-23 05:16
Efficient Committed Oblivious Transfer of Bit Strings model, also assuming the random oracle model for efficient non-interactive proofs. Also, as a motivation for the use of COT instead of OT, we point out that a protocol which uses OT as a subprotocol may have subtle security issues in the presence of malicious adversaries.作者: 遺留之物 時間: 2025-3-23 08:55
Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection twork features while considering a set of 180 different tuning parameters. The main contribution of this work is that it proposes a ranking mechanism to evaluate the effectiveness of features against different types of attacks, and that it suggests a pool of features that could be used to improve the detection process.作者: 壯觀的游行 時間: 2025-3-23 13:15
The Security of Elastic Block Ciphers Against Key-Recovery Attacks a cipher is secure against a given key-recovery attack if the original cipher is secure against such an attack. Our analysis is based on the general structure of elastic block ciphers (. the network’s structure, the composition methods between rounds in the network and the keying methodology) and is independent of the specific cipher.作者: 冬眠 時間: 2025-3-23 16:13
An Efficient Certified Email Protocol communication channel is interrupted during exchange. We also compare our protocol with other optimistic certified email protocols, and conclude that our certified email protocol is the most efficient optimistic certified email protocol.作者: 內(nèi)疚 時間: 2025-3-23 19:41
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2these results with the existence of high correlation between bits 29 and 30 of the S-box to obtain a distinguisher whose bias is around 2.. Consequently, we claim that NLSv2 is distinguishable from a random cipher after observing around 2. keystream words.作者: SEMI 時間: 2025-3-24 01:43
Detecting System Emulatorsss is a necessary step to be able to develop effective detection techniques and removal tools. Security companies typically analyze unknown malware samples using simulated system environments (such as virtual machines or emulators). The reason is that these environments ease the analysis process and作者: 寡頭政治 時間: 2025-3-24 03:03
Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection ead to a significant drop in the detection rate, regardless of the employed detection method. Despite its importance, we believe, that this research area lacks of comprehensive studies. Our research proposes a model for mining the best features that can be extracted directly from the network packets作者: LEVER 時間: 2025-3-24 09:45 作者: incision 時間: 2025-3-24 13:08 作者: 記憶 時間: 2025-3-24 15:22
Traitor Tracing with Optimal Transmission Rate) is asymptotically 1, which is optimal. Previous constructions in this setting either obtained constant (but not optimal) transmission rate?[16], or did not support black-box tracing?[10]. Our treatment improves the standard modeling of black-box tracing by additionally accounting for pirate strate作者: –DOX 時間: 2025-3-24 20:31 作者: 有節(jié)制 時間: 2025-3-25 02:11 作者: flavonoids 時間: 2025-3-25 07:03 作者: 節(jié)省 時間: 2025-3-25 07:46 作者: 摸索 時間: 2025-3-25 13:05
An Efficient Certified Email Protocolanner: a sender Alice sends a message to a receiver Bob if and only if Alice receives a receipt from Bob. In this paper, we present a novel approach to combine the authorized Diffie-Hellman key agreement protocol with a modified Schnorr signature effectively to construct our certified email protocol作者: Ascribe 時間: 2025-3-25 17:36 作者: 無瑕疵 時間: 2025-3-25 23:51 作者: 排名真古怪 時間: 2025-3-26 01:13 作者: 騷動 時間: 2025-3-26 06:43
Strongly-Secure Identity-Based Key Agreement and Anonymous Extensionhe random oracle model, only a weak adversarial model is considered – the adversary is not allowed to ask .-.. queries that will allow the adversary to learn previously established session keys. Recent research efforts devoted to providing a stronger level of security require strong assumptions, suc作者: PLAYS 時間: 2025-3-26 10:54
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2 was called Crossword Puzzle (CP) attack. NLSv2 is a tweak version of NLS which aims mainly at avoiding the CP attack. In this paper, a new distinguishing attack against NLSv2 is presented. The attack exploits high correlation amongst neighboring bits of the cipher. The paper first shows that the mo作者: output 時間: 2025-3-26 12:57
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Pynce their publication in April 2005, a number of cryptanalytic weaknesses of the ciphers have been discovered. As a result, a strengthened version Pypy was developed to repair these weaknesses; it was included in the category of ‘Focus ciphers’ of the Phase II of the eSTREAM competition. However, ev作者: 小樣他閑聊 時間: 2025-3-26 20:13
Queue Management as a DoS Counter-Measure?ion-oriented protocols, where server resources are depleted by uncompleted illegitimate requests generated by the attacker. This includes both crippling DoS attacks where services become unavailable and Quality of Service (QoS) degradation attacks. While these queue management strategies were not in作者: 爭議的蘋果 時間: 2025-3-26 22:03 作者: 遺傳 時間: 2025-3-27 03:29 作者: Sedative 時間: 2025-3-27 09:01
Thomas Raffetseder,Christopher Kruegel,Engin Kirda such learning and teaching in the new knowledge civilisation era: to alleviate regional development disparities and . as well as . on one hand and to change the recording medium of the intellectual heritage of humanity on the other. The interdisciplinary and information science aspects of distance 作者: Entrancing 時間: 2025-3-27 10:29
Iosif-Viorel Onut,Ali A. Ghorbani book Creative Space in the same series and by the same authors, serving this time as editors of a broader book on computational intelligence and knowledge engineering tools for supporting knowledge creation. This book contains four parts. The first part presents a further development of models of k作者: 緩和 時間: 2025-3-27 14:38
Pradeep Kannadiga,Mohammad Zulkernine,Anwar Haque such learning and teaching in the new knowledge civilisation era: to alleviate regional development disparities and . as well as . on one hand and to change the recording medium of the intellectual heritage of humanity on the other. The interdisciplinary and information science aspects of distance 作者: 膽小懦夫 時間: 2025-3-27 18:14 作者: Oratory 時間: 2025-3-27 23:41 作者: 大漩渦 時間: 2025-3-28 02:08
Debra L. Cook,Moti Yung,Angelos D. Keromytiss not only in media sociology and the sociology of gender, bThis edited collection brings together two strands of current discussions in gender research through the concept of creativity. First, it addresses creativity in the context of the family, by exploring changing and newly emergent family for作者: Admire 時間: 2025-3-28 10:14 作者: 討好女人 時間: 2025-3-28 11:40 作者: 疏忽 時間: 2025-3-28 17:03 作者: incarcerate 時間: 2025-3-28 20:47
Jun Shao,Min Feng,Bin Zhu,Zhenfu Caoorms of eclectic genres. It argues that the actors/entrepreneurs of these hubs engage in face-to-face interactions and through Internet technologies with a diverse range of musicians overseas, forming networks transnationally. Babylon, Salon, Minimüzikhol and Peyote in the district of Beyo?lu in Ist作者: Ingredient 時間: 2025-3-29 02:07
Yao-Dong Zhao,Wen-Feng Qitural market. This model includes an effort to channel creation in a morally virtuous sense: promotion of eSport, censorship on game contents, prevention of addiction by controlling children’s uses, and the medicalization of overconsumption. The patterns of the Chinese digital culture are thus shape作者: 使激動 時間: 2025-3-29 06:21
Joo Yeon Cho,Josef Pieprzyktural market. This model includes an effort to channel creation in a morally virtuous sense: promotion of eSport, censorship on game contents, prevention of addiction by controlling children’s uses, and the medicalization of overconsumption. The patterns of the Chinese digital culture are thus shape作者: GROVE 時間: 2025-3-29 09:46 作者: 明智的人 時間: 2025-3-29 14:52
Daniel Boteanu,José M. Fernandez,John McHugh,John Mullinsowth pole in the Yangtze River Delta. In the last two decades, China‘s economy has been undergoing dramatic growth.?Yet, accompanying with China‘s economic success is the disturbing environmental deterioration and energy concerns. These issues together with the diminution of the advantage of low-cos作者: 巧辦法 時間: 2025-3-29 19:33 作者: Accomplish 時間: 2025-3-29 20:51 作者: originality 時間: 2025-3-30 02:12
E-NIPS: An Event-Based Network Intrusion Prediction Systemd based on the attack classes detected in an earlier phase of a penetration scenario. Automatic intrusion prediction provides little but very crucial time required for fortifying networks against attacks, warns network administrators about possible attacks, and reduces the damage caused due to attac作者: CRUE 時間: 2025-3-30 05:21
Enabling Fairer Digital Rights Management with Trusted Computinged open platform. Our architecture allows for openness while protecting security objectives of both users (flexibility, fairer usage, and privacy) and content providers (license enforcement). In particular, it prevents replay attacks that is fundamental for secure management and distribution of stat作者: 形容詞詞尾 時間: 2025-3-30 12:05 作者: 大漩渦 時間: 2025-3-30 14:16
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py can be constructed within the design specifications); it uses a different set of weak states of the TPy. Our results show that distinguishing attacks with complexity lower than the brute force exist if the key size of TPy is longer than 275 bits. Furthermore, we discover a large number of similar b作者: Headstrong 時間: 2025-3-30 19:40 作者: PHIL 時間: 2025-3-30 21:55
On the Concept of Software Obfuscation in Computer Security” model of total obfuscation, obfuscation for software protection, constant hiding, and predicate obfuscation. For each of these models we consider the applications where the model may be valid, positive and negative results on the existence of secure obfuscation in the framework of the model, and r作者: Mnemonics 時間: 2025-3-31 04:29
nd problems with multimedia technology when applied to the record of academic activities and to electronic books are reviewed. As a more specific illustration or case study, the developments of intelligent learning support, together with current trends and problems of individualising teaching and le作者: Cougar 時間: 2025-3-31 06:52 作者: 毛細(xì)血管 時間: 2025-3-31 11:21
Pradeep Kannadiga,Mohammad Zulkernine,Anwar Haquend problems with multimedia technology when applied to the record of academic activities and to electronic books are reviewed. As a more specific illustration or case study, the developments of intelligent learning support, together with current trends and problems of individualising teaching and le作者: Small-Intestine 時間: 2025-3-31 17:13
Ahmad-Reza Sadeghi,Marko Wolf,Christian Stüble,N. Asokan,Jan-Erik Ekbergforms of families and ways of family living, but also challenged the established constellationsof gender and family arrangements. The present volume addresses these issues from multiple perspectives and in different contexts, and explores the involvement of different actors. By problematizing the cr作者: Talkative 時間: 2025-3-31 17:54 作者: 細(xì)頸瓶 時間: 2025-3-31 22:02
Mehmet S. Kiraz,Berry Schoenmakers,José Villegases, with significant criticism from the creative community it evolved to support and work with. The current management team and Trustees of the Dartington Hall Trust are in the process of working through Dartington’s place in the current creative economy. This chapter addresses how the current manag作者: 含鐵 時間: 2025-4-1 04:23
Jun Shao,Min Feng,Bin Zhu,Zhenfu Cao policies. Babylon and Salon stand more hierarchized, and thus institutionalized, in comparison with Minimüzikhol and Peyote. Nevertheless, a common ground that can be made is that these actors/entrepreneurs can be considered as the curators of these hubs, where the regulatory regime which they had 作者: aphasia 時間: 2025-4-1 07:22
Yao-Dong Zhao,Wen-Feng Qibling disorders. Paradoxically, China’s policy framework for gaming has contributed to the emergence of commercial practices and profit-driven game designs that are more harmful. Youth gaming is caught up in contradictions linked to government and business objectives that are difficult to reconcile