標(biāo)題: Titlebook: Information Security and Privacy; 9th Australasian Con Huaxiong Wang,Josef Pieprzyk,Vijay Varadharajan Conference proceedings 2004 Springer [打印本頁] 作者: nourish 時間: 2025-3-21 19:53
書目名稱Information Security and Privacy影響因子(影響力)
書目名稱Information Security and Privacy影響因子(影響力)學(xué)科排名
書目名稱Information Security and Privacy網(wǎng)絡(luò)公開度
書目名稱Information Security and Privacy網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Security and Privacy被引頻次
書目名稱Information Security and Privacy被引頻次學(xué)科排名
書目名稱Information Security and Privacy年度引用
書目名稱Information Security and Privacy年度引用學(xué)科排名
書目名稱Information Security and Privacy讀者反饋
書目名稱Information Security and Privacy讀者反饋學(xué)科排名
作者: 哺乳動物 時間: 2025-3-21 21:04 作者: Keratectomy 時間: 2025-3-22 01:25
Single Database Private Information Retrieval with Logarithmic Communicatione big-. notation is quite small, and ? is unrestricted. Moreover, we show a way to do communication balancing between the sender-side and the receiver-side, and show how to handle malicious receivers with small communication overheads.作者: BLA 時間: 2025-3-22 06:31
0302-9743 a, six from Australia, ?ve each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Nether978-3-540-22379-5978-3-540-27800-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 種族被根除 時間: 2025-3-22 12:16
Goichiro Hanaoka,Hideki Imai,Joern Mueller-Quade,Anderson C. A. Nascimento,Akira Otsuka,Andreas Wint作者: Thyroxine 時間: 2025-3-22 16:11 作者: fiction 時間: 2025-3-22 18:22
Yongsup Shin,Jongsung Kim,Guil Kim,Seokhie Hong,Sangjin Lee作者: 雄辯 時間: 2025-3-23 00:27 作者: 慷慨援助 時間: 2025-3-23 02:13
Youngdai Ko,Changhoon Lee,Seokhie Hong,Sangjin Lee作者: Ceremony 時間: 2025-3-23 08:18 作者: V洗浴 時間: 2025-3-23 11:56
https://doi.org/10.1007/b98755Code; Information; Resolution; Signatur; authentication; cryptography; cryptology; data security; distribute作者: BRAWL 時間: 2025-3-23 16:45 作者: Anticoagulant 時間: 2025-3-23 21:57 作者: 食物 時間: 2025-3-24 00:26 作者: 小丑 時間: 2025-3-24 03:06 作者: 夜晚 時間: 2025-3-24 07:46 作者: Cubicle 時間: 2025-3-24 12:31
978-3-540-22379-5Springer-Verlag Berlin Heidelberg 2004作者: 使長胖 時間: 2025-3-24 15:12
Information Security and Privacy978-3-540-27800-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 刺穿 時間: 2025-3-24 21:36
Huaxiong Wang,Josef Pieprzyk,Vijay VaradharajanIncludes supplementary material: 作者: Parley 時間: 2025-3-24 23:26
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465400.jpg作者: Scleroderma 時間: 2025-3-25 06:07
0302-9743 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie U- versity and the Australian Computer Society. Theaimsoftheconferencearetobringtogetherresearchersandpractitioner作者: affinity 時間: 2025-3-25 09:16
Linear Code Implies Public-Key Traitor Tracing with ,nt to a slight modification of the corrected Kurosawa-Desmedt scheme, we show that we can also modify the Boneh–Franklin scheme to provide user revocation capability for this scheme. We also look at the problem of permanent removing a traitor in the Boneh-Franklin and prove some negative results.作者: 價值在貶值 時間: 2025-3-25 14:07 作者: commodity 時間: 2025-3-25 17:57 作者: 變形 時間: 2025-3-25 23:37
The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Ordersructural properties of the class semigroup render these crytosystems insecure, and that any cryptosystems based on the class semigroup are unlikely to provide any more security than those using the class group.作者: 誘騙 時間: 2025-3-26 01:25 作者: 拋物線 時間: 2025-3-26 04:25 作者: 無力更進 時間: 2025-3-26 09:09
Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Schemeng receivers. We also propose a new method using trapdoor one-way permutations to reduce the storage overhead in the SD and Layered SD methods. This new method eliminates log . labels from receivers’ storage, where . is the total number of receivers. The method requires few public values and little computational overhead.作者: Sinus-Node 時間: 2025-3-26 16:17 作者: sigmoid-colon 時間: 2025-3-26 19:25
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Modelctions we have 22 more collision resistant and one-way secure hash families. As all these 42 families are keyed hash families, these become target collision resistant also. All these 42 hash families have tight upper and lower bounds on (target) collision resistant and one-way-ness.作者: 使害羞 時間: 2025-3-26 23:26
Multi-service Oriented Broadcast Encryptiona threshold, a rekeying algorithm is proposed to update the user’s service memberships .. We formalize and prove the framework is dynamically secure under the random oracle model. We realize our framework with a scheme based on complete subtree method.作者: Narrative 時間: 2025-3-27 03:36
NGSCB: A Trusted Open Systemol and network authentication in mass market systems by authenticating executable code at all system layers. We have implemented a prototype of the system and expect the full system to be mass deployed.作者: Pudendal-Nerve 時間: 2025-3-27 07:27
Analysis of a Conference Scheme Under Active and Passive Attackss in the way that a colluding group of attackers can still obtain the conference key even after they all leave the conference. The passive attack does not need any attacker to ever participate in the conference. The conference key can be compromised with a large probability as long as the number of conferees is large.作者: ticlopidine 時間: 2025-3-27 12:36 作者: 生意行為 時間: 2025-3-27 16:20
Multi-service Oriented Broadcast Encryptionhis paper, we suggest a framework called . framework from the subset cover method [12] using RSA exponentiation technique. In this framework, each user’s secret storage is independent of the number of services. Service subscriptions and service providing can be efficiently processed. The service uns作者: Schlemms-Canal 時間: 2025-3-27 19:26 作者: Surgeon 時間: 2025-3-28 00:32
Linear Code Implies Public-Key Traitor Tracing with ,urosawa–Desmedt scheme, can be derived from an [.,.,.]-linear code such that . ≥ 2.+1. In this paper, we show that the linear-coded Kurosawa–Desmedt scheme can be modified to allow revocation of users, that is to show a revocation scheme can be derived from a linear code. The overhead of the modifie作者: 口味 時間: 2025-3-28 04:39 作者: Enliven 時間: 2025-3-28 07:43
Single Database Private Information Retrieval with Logarithmic Communicationty and a solution with only logarithmic user-side communication complexity. Previously the best result could only achieve polylogarithmic communication on each side, and was based on certain less well-studied assumptions in number theory [6]. On the contrary, our schemes are based on Paillier’s cryp作者: CORE 時間: 2025-3-28 11:49
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructionson the size of the predistributed data, as well as the size of the communications in any (one-round) protocol. We then show that these bounds are tight by exhibiting a scheme for oblivious polynomial evaluation achieveing all the lower bounds simultaneously. We also present a natural generalisation 作者: fatty-acids 時間: 2025-3-28 15:41 作者: Offensive 時間: 2025-3-28 20:17
NGSCB: A Trusted Open Systemmmercial requirements of mass market systems. This poses a number of challenges and we describe the system architecture we have used to overcome them. We pay particular attention to reducing the trusted computing base to a small and manageable size. This includes operating the system without trustin作者: Camouflage 時間: 2025-3-29 02:32 作者: 蟄伏 時間: 2025-3-29 04:26 作者: 柳樹;枯黃 時間: 2025-3-29 09:22
The Related-Key Rectangle Attack – Application to SHACAL-1h the related-key attack. Using this combined attack we can attack the SHACAL-1 cipher with 512-bit keys up to 59 out of its 80 rounds. Our 59-round attack requires a data complexity of 2. chosen plaintexts and a time complexity of 2. encryptions, which is faster than exhaustive search.作者: Stable-Angina 時間: 2025-3-29 12:32
Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1otation with simple key schedule. To find partial 35-bit subkeys of SPECTR-H64 it needs about 2. data and 2. encryptions with an expected success probability 95.8%. As for CIKS-1, 2. data and 2. encryptions are requried to find the final round key of it with an expected success probability 80%.作者: FILTH 時間: 2025-3-29 16:24 作者: 不自然 時間: 2025-3-29 19:47 作者: Collar 時間: 2025-3-30 02:02 作者: Engaged 時間: 2025-3-30 06:16
Analysis and Improvement of Micali’s Fair Contract Signing Protocols a US patent No 5666420 in 1997 [16]. In the protocol, two mutually distrusted parties exchange their commitments to a contract in a fair way such that either each of them can obtain the other’s commitment, or neither of them does. The protocol is optimistic in the sense that the trusted party need作者: GULLY 時間: 2025-3-30 11:03 作者: 公式 時間: 2025-3-30 15:09
Generic Construction of Certificateless Signaturerty. While Shamir’s identity-based signature scheme can dispense with certificates, the key escrow of a user’s private key is inherent in the identity-based signature scheme. In Asiacrypt 2003, a new digital signature paradigm called the certificateless signature was introduced. The certificateless 作者: febrile 時間: 2025-3-30 19:01 作者: 突變 時間: 2025-3-30 21:18 作者: 伙伴 時間: 2025-3-31 01:46 作者: Adj異類的 時間: 2025-3-31 07:32 作者: 辮子帶來幫助 時間: 2025-3-31 12:01
Zur Geschichte des Rundfunks in ?sterreichshow how standard Web search engines can be used as the main inference motor for processing ontology-based semantic search queries on the Web. We develop the formal model behind this approach and also provide an implementation in desktop search. Furthermore, we?report on extensive experimental results.作者: Irascible 時間: 2025-3-31 17:16
Sonographie und MRT bei Stressharninkontinenzinkters oder der Mobilit?t der Urethra in Ruhe und auch unter Stressbedingungen. Demgegenüber bietet die Magnetresonanztomographie den Vorteil, dass sie sowohl das Lumen als auch extralumin?re Strukturen in einer einzigen Sitzung abbilden kann. Zus?tzlich kann man mithilfe eines MRT Morphologie und Funktionen beurteilen.作者: Vulnerary 時間: 2025-3-31 19:50 作者: 哀求 時間: 2025-3-31 22:24 作者: Verify 時間: 2025-4-1 05:15
,Intent to Impact – Diluted Safe Water Monitoring,water target—by counting those that have access to “improved water supplies”—does not fully address water quality, quantity and sustainable access—key components of the target that are fundamental to human health. Overly simplistic metrics used to monitor progress on important health and development作者: 除草劑 時間: 2025-4-1 08:22 作者: Needlework 時間: 2025-4-1 12:14
2 Voorlichting in het paramedisch handelen,en, oefeningen doen of veranderen van gewoontes. Voorlichting gaat dus vaak over gedrag. Niet alleen over gedrag zolang de behandeling duurt, maar ook over gedrag daarna en over (verandering van) gewoontes, met het oog op het voorkomen van gezondheidsproblemen in de toekomst. Veranderen van gedrag g作者: 洞察力 時間: 2025-4-1 16:33 作者: 刺激 時間: 2025-4-1 19:05
Alberto Bucci,Lorenzo Carbonari,Giovanni Trovaton. Die Fachautoren haben die manchmal recht schwierige Rechtslage dem Techniker einfühlsam versucht darzulegen und hoffen, dass dies gelungen ist. Letztlich ist das Fachbuch ein ?gewollter Zwitter“ zwischen der Darstellung regelm??i978-3-8351-9234-8