標題: Titlebook: Information Security and Cryptology; 10th International C Dongdai Lin,Moti Yung,Jianying Zhou Conference proceedings 2015 Springer Internat [打印本頁] 作者: 尖酸好 時間: 2025-3-21 18:20
書目名稱Information Security and Cryptology影響因子(影響力)
書目名稱Information Security and Cryptology影響因子(影響力)學科排名
書目名稱Information Security and Cryptology網絡公開度
書目名稱Information Security and Cryptology網絡公開度學科排名
書目名稱Information Security and Cryptology被引頻次
書目名稱Information Security and Cryptology被引頻次學科排名
書目名稱Information Security and Cryptology年度引用
書目名稱Information Security and Cryptology年度引用學科排名
書目名稱Information Security and Cryptology讀者反饋
書目名稱Information Security and Cryptology讀者反饋學科排名
作者: restrain 時間: 2025-3-21 23:39
laws, parties or state constitutions, but of open, indefinably critical communities such as audiences, peers and friends..Critical Communities and Aesthetic Practices. is distinctive in providing a current sel978-94-007-9355-2978-94-007-1509-7Series ISSN 0923-9545 Series E-ISSN 2215-1915 作者: Nonporous 時間: 2025-3-22 01:00 作者: entice 時間: 2025-3-22 07:00 作者: 玩笑 時間: 2025-3-22 09:06
Bei Liang,Rui Zhang,Hongda Li laws, parties or state constitutions, but of open, indefinably critical communities such as audiences, peers and friends..Critical Communities and Aesthetic Practices. is distinctive in providing a current sel978-94-007-9355-2978-94-007-1509-7Series ISSN 0923-9545 Series E-ISSN 2215-1915 作者: 噴油井 時間: 2025-3-22 14:01
Zhangjie Huang,Lei Hu,Jun Xu laws, parties or state constitutions, but of open, indefinably critical communities such as audiences, peers and friends..Critical Communities and Aesthetic Practices. is distinctive in providing a current sel978-94-007-9355-2978-94-007-1509-7Series ISSN 0923-9545 Series E-ISSN 2215-1915 作者: CHASM 時間: 2025-3-22 17:20
lar contexts. It is for this reason that the contributors investigate the politics, not of laws, parties or state constitutions, but of open, indefinably critical communities such as audiences, peers and friends..Critical Communities and Aesthetic Practices. is distinctive in providing a current sel作者: 審問 時間: 2025-3-22 22:12
lar contexts. It is for this reason that the contributors investigate the politics, not of laws, parties or state constitutions, but of open, indefinably critical communities such as audiences, peers and friends..Critical Communities and Aesthetic Practices. is distinctive in providing a current sel作者: GLARE 時間: 2025-3-23 03:51
Paolo Palmieri,Luca Calderoni,Dario Maiolar contexts. It is for this reason that the contributors investigate the politics, not of laws, parties or state constitutions, but of open, indefinably critical communities such as audiences, peers and friends..Critical Communities and Aesthetic Practices. is distinctive in providing a current sel作者: kyphoplasty 時間: 2025-3-23 08:00
Tao Zhang,Sherman S. M. Chowlar contexts. It is for this reason that the contributors investigate the politics, not of laws, parties or state constitutions, but of open, indefinably critical communities such as audiences, peers and friends..Critical Communities and Aesthetic Practices. is distinctive in providing a current sel作者: Firefly 時間: 2025-3-23 10:40 作者: Innocence 時間: 2025-3-23 17:19
James Alderman,Christian Janson,Carlos Cid,Jason Cramptonlar contexts. It is for this reason that the contributors investigate the politics, not of laws, parties or state constitutions, but of open, indefinably critical communities such as audiences, peers and friends..Critical Communities and Aesthetic Practices. is distinctive in providing a current sel作者: Servile 時間: 2025-3-23 20:22 作者: FOR 時間: 2025-3-24 00:24
Fei Tang,Hongda Lilar contexts. It is for this reason that the contributors investigate the politics, not of laws, parties or state constitutions, but of open, indefinably critical communities such as audiences, peers and friends..Critical Communities and Aesthetic Practices. is distinctive in providing a current sel作者: Foreknowledge 時間: 2025-3-24 06:25 作者: Flat-Feet 時間: 2025-3-24 09:49
Ning Dinglar contexts. It is for this reason that the contributors investigate the politics, not of laws, parties or state constitutions, but of open, indefinably critical communities such as audiences, peers and friends..Critical Communities and Aesthetic Practices. is distinctive in providing a current sel作者: Parallel 時間: 2025-3-24 11:24 作者: Ceremony 時間: 2025-3-24 15:47
Fuqun Wang,Kunpeng Wangpt as a heuristic means by which to provide some insights into a mapping of the field—both epistemologically and methodologically—in terms of creating a space for reflecting on the limits and possibilities of queer studies in education for the twenty-first century. In no means did we conceive of thi作者: Erythropoietin 時間: 2025-3-24 21:18
Russell W. F. Lai,Henry K. F. Cheung,Sherman S. M. Chowfrom plain sight, that is also a spiritual agency insofar as it enables them to beg pardon for their own souls and the souls of others. I argue that this is a confession that can only be articulated from behind walls and requires a certain form of self-enclosure to fulfill its actualizing and redeem作者: Rodent 時間: 2025-3-25 01:14 作者: Carcinogenesis 時間: 2025-3-25 03:35
Spatial Bloom Filters: Enabling Privacy in Location-Aware Applicationsters (BF), a compact data structure for representing sets. In particular, we present an extension of the original Bloom filter idea: the Spatial Bloom Filter (SBF). SBF’s are designed to manage spatial and geographical information in a space efficient way, and are well-suited for enabling privacy in作者: 信任 時間: 2025-3-25 09:12
Security of Direct Anonymous Authentication Using TPM 2.0 Signatured private key, namely, signing or authentication, and joining the system (for proving the knowledge of the private key to the issuer of the DAA credential). In this paper, we analyzed the current security model of DAA schemes with this in mind, identified the weakness and the corresponding implement作者: GROWL 時間: 2025-3-25 13:20
Revocation in Publicly Verifiable Outsourced Computationintroduce a notion of blind verification such that results are verifiable (and hence servers can be rewarded or punished) without learning the value. We present a rigorous definitional framework, define a number of new security models and present a construction of such a scheme built upon Key-Policy作者: 主動 時間: 2025-3-25 19:08 作者: GET 時間: 2025-3-25 23:34
Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledgeuniversal arguments which admit a candidate construction of the two-round variant of Micali’s CS-proof, there exists a two-round public-coin plain/bounded-auxiliary-input ZK argument..So an interesting question in ZKAOK is how to improve the exact round complexity of public-coin ZKAOK in both the ge作者: visual-cortex 時間: 2025-3-26 00:33
Optimal Proximity Proofss these limitations, setting the “security vs. efficiency” record straight..Concretely, by combining ideas from SKI and FO, we propose symmetric protocols that are efficient, noise-tolerant and—at the same time—provably secure against all known frauds. Indeed, our new distance-bounding solutions out作者: Diuretic 時間: 2025-3-26 08:18 作者: Euphonious 時間: 2025-3-26 10:31 作者: BABY 時間: 2025-3-26 13:12 作者: intimate 時間: 2025-3-26 18:31 作者: 抗原 時間: 2025-3-26 23:15
Information Security and Cryptology978-3-319-16745-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Euthyroid 時間: 2025-3-27 01:17
Conference proceedings 2015 Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, latt作者: Expertise 時間: 2025-3-27 08:11
An Efficient Privacy-Preserving E-coupon Systemtomer during the redemption process. In this paper, we present a novel e-coupon system that can achieve all these desirable properties. We define the formal security models for these new security requirements, and show that our new e-coupon system is proven secure in the proposed models.作者: 持續(xù) 時間: 2025-3-27 13:16 作者: Resection 時間: 2025-3-27 14:40
Universally Composable Identity Based Adaptive Oblivious Transfer with Access Controladversary under .-Strong Diffie-Hellman (SDH), Decision Bilinear Diffie-Hellman (DBDH), .-Decision Bilinear Diffie-Hellman Exponent (DBDHE) and Decision Linear (DLIN) assumptions. The scheme outperforms the existing similar schemes in terms of both communication and computation.作者: 宴會 時間: 2025-3-27 20:24 作者: 輕浮女 時間: 2025-3-27 21:55 作者: DUCE 時間: 2025-3-28 05:57
Trapdoors for Ideal Lattices with Applicationsion, we use the new trapdoor to construct a new hierarchical identity-based encryption scheme, which allows us to construct public-key encryption with chosen-ciphertext security, signatures, and public-key searchable encryption.作者: Entirety 時間: 2025-3-28 06:20 作者: atrophy 時間: 2025-3-28 11:28
A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBACitecture and model transformations between them. We therefore introduce a modelling language extension/ profile for defining system requirements with basic security requirement concepts. We also formalize the model transformation between this profile and a security formal verification method. We exemplify our approach on a medical case study.作者: 借喻 時間: 2025-3-28 18:34
Conference proceedings 2015s. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and application.作者: TOXIN 時間: 2025-3-28 18:48 作者: 咒語 時間: 2025-3-29 02:23
An Efficient Privacy-Preserving E-coupon Systemnonymity/unlinkability. However, achieving both traceability against dishonest users and anonymity for honest users without involving any third party is an open problem that has not been solved by the previous work. Another desirable feature of an e-coupon system that has not been studied in the lit作者: MOTIF 時間: 2025-3-29 03:34 作者: 小故事 時間: 2025-3-29 10:51 作者: 使出神 時間: 2025-3-29 13:20 作者: 注意 時間: 2025-3-29 17:25
Private Aggregation with Custom Collusion Toleranceheless, many applications need this functionality, while others need it for simpler computations; operations such as multiplication or addition might be sufficient. In this work we extend the well-known multiparty computation protocol (MPC) for summation of Kurswave . More precisely, we introduce tw作者: 蘑菇 時間: 2025-3-29 21:05 作者: Adrenal-Glands 時間: 2025-3-30 03:27 作者: Resign 時間: 2025-3-30 06:27
Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledgeknown that Barak’s non-black-box ZK [FOCS 01], which can be adapted to a ZKAOK, is the first one achieving constant-round, public-coin and strict-polynomial-time simulation properties, and admitting a 6-round implementation shown by Ostrovsky and Visconti [ECCC 12]. This achieves the best exact roun作者: chalice 時間: 2025-3-30 09:06
A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC the requirements. To reduce these conformity problems, Model Driven Engineering proposes using modelling languages for defining requirements and architecture and model transformations between them. We therefore introduce a modelling language extension/ profile for defining system requirements with 作者: fleeting 時間: 2025-3-30 13:06 作者: 全面 時間: 2025-3-30 17:06