標(biāo)題: Titlebook: Information Security and Cryptology - ICISC‘99; Second International JooSeok Song Conference proceedings 2000 Springer-Verlag Berlin Heidel [打印本頁] 作者: 預(yù)兆前 時(shí)間: 2025-3-21 18:09
書目名稱Information Security and Cryptology - ICISC‘99影響因子(影響力)
書目名稱Information Security and Cryptology - ICISC‘99影響因子(影響力)學(xué)科排名
書目名稱Information Security and Cryptology - ICISC‘99網(wǎng)絡(luò)公開度
書目名稱Information Security and Cryptology - ICISC‘99網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Security and Cryptology - ICISC‘99被引頻次
書目名稱Information Security and Cryptology - ICISC‘99被引頻次學(xué)科排名
書目名稱Information Security and Cryptology - ICISC‘99年度引用
書目名稱Information Security and Cryptology - ICISC‘99年度引用學(xué)科排名
書目名稱Information Security and Cryptology - ICISC‘99讀者反饋
書目名稱Information Security and Cryptology - ICISC‘99讀者反饋學(xué)科排名
作者: Resign 時(shí)間: 2025-3-21 22:13
Serge Vaudenays made digitalization a battleground over control of the tech imperium. This dangerous development undermines the realization of a coordinated?international response to the climate crisis. It has also led to the securitization of access to critical minerals and their extensive globalized supply chai作者: Resection 時(shí)間: 2025-3-22 03:43 作者: –scent 時(shí)間: 2025-3-22 07:53
DaeHun Nyang,JooSeok Songike other nations, has underestimated the material intensity of the green transition including the unprecedented levels of extraction it generates, the socio-economic impacts along the entire life cycles of technologies and related materials value chains, and its significant global environmental foo作者: MARS 時(shí)間: 2025-3-22 10:30
Ju-Sung Kang,Choonsik Park,Sangjin Lee,Jong-In Limnces recognition of hard political situation with complex an.This book examines the latest manifestations of resource competition. The energy transition and the digitalization of the global economy are both accelerating even as geopolitics driven by Sino-American hyper-competition become increasingl作者: Ergots 時(shí)間: 2025-3-22 16:39 作者: ACTIN 時(shí)間: 2025-3-22 19:35 作者: BLINK 時(shí)間: 2025-3-23 00:56 作者: 上下連貫 時(shí)間: 2025-3-23 04:38 作者: Perigee 時(shí)間: 2025-3-23 09:11
Kook-Heui Lee,Sang-Jae Moon,Won-Young Jeong,Tae-Geun Kimprominently at leading universities around the world.Works t.Forward-thinking pedagogues as well as peace researchers have, in recent decades, cast a critical eye over teaching content and methodology with the aim of promulgating notions of peace and sustainability in education. This volume gives vo作者: 心胸狹窄 時(shí)間: 2025-3-23 12:22
Josef Pieprzyk,Eiji OkamotoCritical Pedagogy in actual primary and secondary classrooms.Critical Pedagogy addresses the shortcomings of mainstream educational theory and practice and promotes the humanization of teacher and student. Where Critical Pedagogy is often treated as a discourse of academics in universities, this boo作者: reflection 時(shí)間: 2025-3-23 17:17 作者: 無法取消 時(shí)間: 2025-3-23 18:07 作者: 防水 時(shí)間: 2025-3-23 23:24
Ho-Sun Yoon,Heung-Youl YoumCritical Pedagogy in actual primary and secondary classrooms.Critical Pedagogy addresses the shortcomings of mainstream educational theory and practice and promotes the humanization of teacher and student. Where Critical Pedagogy is often treated as a discourse of academics in universities, this boo作者: vector 時(shí)間: 2025-3-24 03:34 作者: keloid 時(shí)間: 2025-3-24 10:35
Jussipekka Leiwo,Christoph H?nle,Philip Homburg,Chandana Gamage,Andrew S. TanenbaumCritical Pedagogy in actual primary and secondary classrooms.Critical Pedagogy addresses the shortcomings of mainstream educational theory and practice and promotes the humanization of teacher and student. Where Critical Pedagogy is often treated as a discourse of academics in universities, this boo作者: inspired 時(shí)間: 2025-3-24 11:34 作者: Insufficient 時(shí)間: 2025-3-24 18:27
Correlation Properties of the Bluetooth Combinertance of this limitation is proved by showing that the Bluetooth stream cipher with 128 bit key can be broken in . steps given an output key stream segment of length .. We also show how the correlation properties of the .. combiner can be improved by making a small modification in the memory update 作者: wall-stress 時(shí)間: 2025-3-24 19:51
On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysiurity of these diffusion layers against differential and linear cryptanalysis by using the notion of active S-boxes. We show that the minimum number of differentially active S-boxes and that of linearly active S-boxes are generally not identical and propose some special conditions in which those are作者: 留戀 時(shí)間: 2025-3-25 01:05
Relationships between Bent Functions and Complementary Plateaued Functionslts obtained in this paper contribute to the further understanding of profound secrets of bent functions. Cryptographic applications of these results are demonstrated by constructing highly nonlinear correlation immune functions that possess no non-zero linear structures.作者: 最初 時(shí)間: 2025-3-25 03:21 作者: Picks-Disease 時(shí)間: 2025-3-25 10:22
Speeding Up Elliptic Scalar Multiplication with Precomputationlgorithms for such elliptic scalar multiplication. Implementation results on Pentium II and Alpha 21164 microprocessors are also provided to demonstrate the presented improvements in actual implementations.作者: Semblance 時(shí)間: 2025-3-25 13:00 作者: arterioles 時(shí)間: 2025-3-25 18:48
Secure Selection Protocolsg . protocol applications, which will eventually lead to better understanding and refinement of these applications. We present a proposal for a specialised selection protocol with anonymity as the security service. An area for its application is anonymous peer review, where no peer should know the i作者: 到婚嫁年齡 時(shí)間: 2025-3-26 00:04 作者: Pulmonary-Veins 時(shí)間: 2025-3-26 00:39
A 2-Pass Authentication and Key Agreement Protocol for Mobile Communicationss 1.5-move protocol for air-interface of mobile systems. The paper outlines the new protocol, examines its various aspects, and compares them to those of other 2-pass protocols of the PACS and the 1.5-move protocol.作者: Malfunction 時(shí)間: 2025-3-26 06:46 作者: FANG 時(shí)間: 2025-3-26 10:56
A New Approach to Robust Threshold RSA Signature Schemes threshold signature system is . if it allows generation of correct signatures for a group of . honest participants, and in the presence of malicious participants. The purpose of this paper is two-fold. First we show that a robust (., .) threshold RSA signature scheme, proposed by Rabin in Crypto’98作者: 過于光澤 時(shí)間: 2025-3-26 16:28 作者: 是他笨 時(shí)間: 2025-3-26 18:38
A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signaturew secret sharing schemes and a robust multiplication protocol based on the non-interactive ZK proof. The secret sharing scheme using a hash function can verify the validity of the received data easily, therefore we can reduce the complexity of the protocol. Also we present a robust multiplication pr作者: GRACE 時(shí)間: 2025-3-26 23:27
A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Cu.). We take curves of genus 3 and 6, designed by using 0.27-um CMOS gate array technology, and estimate the number of multiplication operations and the size and speed of hardware based on the proposed algorithm. It is shown that hardware for genus 6 curves computes an addition (resp. doubling) opera作者: fiscal 時(shí)間: 2025-3-27 04:02 作者: 有常識(shí) 時(shí)間: 2025-3-27 08:04 作者: 供過于求 時(shí)間: 2025-3-27 13:31
Correlation Properties of the Bluetooth Combinertance of this limitation is proved by showing that the Bluetooth stream cipher with 128 bit key can be broken in . steps given an output key stream segment of length .. We also show how the correlation properties of the .. combiner can be improved by making a small modification in the memory update function.作者: 表主動(dòng) 時(shí)間: 2025-3-27 15:53 作者: 我的巨大 時(shí)間: 2025-3-27 18:00 作者: fatty-streak 時(shí)間: 2025-3-27 22:04
Secure Selection Protocolsg . protocol applications, which will eventually lead to better understanding and refinement of these applications. We present a proposal for a specialised selection protocol with anonymity as the security service. An area for its application is anonymous peer review, where no peer should know the identity of the reviewer.作者: 免除責(zé)任 時(shí)間: 2025-3-28 02:59
A 2-Pass Authentication and Key Agreement Protocol for Mobile Communicationss 1.5-move protocol for air-interface of mobile systems. The paper outlines the new protocol, examines its various aspects, and compares them to those of other 2-pass protocols of the PACS and the 1.5-move protocol.作者: 固定某物 時(shí)間: 2025-3-28 07:20 作者: 協(xié)定 時(shí)間: 2025-3-28 12:18 作者: keloid 時(shí)間: 2025-3-28 15:31 作者: 小樣他閑聊 時(shí)間: 2025-3-28 20:00
A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash FunctionsIn this paper, we show a practical solution to the problems where one-wayness of hash functions does not guarantee cryptographic systems to be secure enough. We strengthen the notion of one-wayness of hash functions and construct strongly one-way hash functions from any one-way hash function or any one-way function.作者: 成份 時(shí)間: 2025-3-29 02:26 作者: 豪華 時(shí)間: 2025-3-29 06:38
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465380.jpg作者: 昏暗 時(shí)間: 2025-3-29 08:41
978-3-540-67380-4Springer-Verlag Berlin Heidelberg 2000作者: 彩色 時(shí)間: 2025-3-29 14:50
Information Security and Cryptology - ICISC‘99978-3-540-45568-4Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: amplitude 時(shí)間: 2025-3-29 18:59
0302-9743 Overview: Includes supplementary material: 978-3-540-67380-4978-3-540-45568-4Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Decongestant 時(shí)間: 2025-3-29 22:56
st and along conceptions of rationality..· Understanding confidence: its roots and role in performance..· Mindfulness in action: the emergence of distinctive thought and behavior..· Langerian mindfulness and optimal sport performance..· Health and the psychology of possibility.. .Critical Mindfulnes作者: Coronation 時(shí)間: 2025-3-30 01:40
Serge Vaudenay latest manifestation of resource competition. It recommends the lowering of the rhetoric of hyper-competition so that the response to the climate crisis does not become a starting pistol for a new scramble: for inputs, “geopolitically engineered” supply chains?and the building up of tech and knowle作者: 分散 時(shí)間: 2025-3-30 04:46
Miia Hermelin,Kaisa Nyberglarly from the European Union (EU), whose standards are the most developed. The Escazu Agreement guarantees rights to information, participation and access to justice in environmental matters, and mandates the involvement and protection of civil society organizations (CSOs) and personnel. Moreover, 作者: habile 時(shí)間: 2025-3-30 08:55
DaeHun Nyang,JooSeok Song cobalt, graphite, manganese, and platinum group elements. Moreover, parts of the value chain are highly concentrated, often in China. This chapter will examine how the EU, and Germany in particular, now address these important shortages and challenges by recognizing the need for joint public privat作者: flamboyant 時(shí)間: 2025-3-30 13:00
William D. Banks,Frances Griffin,Daniel Lieman,Igor E. Shparlinskious shocks seem straightforward, there is an increasingly evident paradox. To achieve significant decarbonization and electrification goals, more, not fewer, battery raw materials will be required and the energy used to produce these materials will almost certainly originate from fossil fuels, possi作者: HEAVY 時(shí)間: 2025-3-30 19:47
Yuliang Zheng,Xian-Mo Zhange ‘messiness’ of narrative co-construction. It is, therefore, worth acknowledging that this kind of intimate and extended textual analysis can be difficult to persist with: as will be evident below, close readings of this kind are laborious and complex, focusing on the fine mesh of often contradicto作者: eulogize 時(shí)間: 2025-3-31 00:26
Takeshi Koshibaeen how he actively situates himself through personal narrative, and what canonical narratives may be employed in this. It may also suggest to what extent the canonical narrative warrants or is resisted by personal narrative, possibly in favour of contesting, potentially ‘a(chǎn)lternative, “replacement d作者: seduce 時(shí)間: 2025-3-31 03:11
Hyoungkyu Lee,Kiwook Sohn,Hyoungkyu Yang,Dongho Won issues of peace and security as issues of what can and cannot be governed. As such, our critical understanding of peace and conflict must be remade and reinstituted. Peters and Thayer examine the concept of “Crimes against Peace” and the way it was formulated after Nuremberg before discussing neoco作者: 暫時(shí)中止 時(shí)間: 2025-3-31 06:58 作者: MAPLE 時(shí)間: 2025-3-31 10:44 作者: 統(tǒng)治人類 時(shí)間: 2025-3-31 14:49
Shingo Miyazaki,Kouichi Sakurai,Moti Yungcurriculum planning and instruction, from the social construction of knowledge to embodied cognition, this book takes the theories behind Critical Pedagogy and illustrates them at work in common classroom environments. .978-90-481-7887-2978-1-4020-8463-8Series ISSN 1875-4449 Series E-ISSN 1875-4457 作者: 紀(jì)念 時(shí)間: 2025-3-31 20:09 作者: Nonconformist 時(shí)間: 2025-3-31 23:26 作者: 散步 時(shí)間: 2025-4-1 03:51
Jussipekka Leiwo,Christoph H?nle,Philip Homburg,Chandana Gamage,Andrew S. Tanenbaumcurriculum planning and instruction, from the social construction of knowledge to embodied cognition, this book takes the theories behind Critical Pedagogy and illustrates them at work in common classroom environments. .978-90-481-7887-2978-1-4020-8463-8Series ISSN 1875-4449 Series E-ISSN 1875-4457 作者: anus928 時(shí)間: 2025-4-1 09:09 作者: enfeeble 時(shí)間: 2025-4-1 12:47