標(biāo)題: Titlebook: Information Security and Privacy; Second Australasian Vijay Varadharajan,Josef Pieprzyk,Yi Mu Conference proceedings 1997 Springer-Verlag [打印本頁(yè)] 作者: 烤問(wèn) 時(shí)間: 2025-3-21 19:42
書(shū)目名稱Information Security and Privacy影響因子(影響力)
書(shū)目名稱Information Security and Privacy影響因子(影響力)學(xué)科排名
書(shū)目名稱Information Security and Privacy網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Information Security and Privacy網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Information Security and Privacy被引頻次
書(shū)目名稱Information Security and Privacy被引頻次學(xué)科排名
書(shū)目名稱Information Security and Privacy年度引用
書(shū)目名稱Information Security and Privacy年度引用學(xué)科排名
書(shū)目名稱Information Security and Privacy讀者反饋
書(shū)目名稱Information Security and Privacy讀者反饋學(xué)科排名
作者: Instantaneous 時(shí)間: 2025-3-21 20:55
Purpose-oriented access control model in object-based systems,. An object is modeled as a pair of data structure and operations. In the cooperation among multiple objects, it is important to protect against illegal information flow among the objects. In this paper, we discuss an access control model for an object-based system. We propose a novel . access contr作者: Peak-Bone-Mass 時(shí)間: 2025-3-22 03:37 作者: 發(fā)起 時(shí)間: 2025-3-22 05:31 作者: Robust 時(shí)間: 2025-3-22 11:57 作者: 和平 時(shí)間: 2025-3-22 15:18 作者: 男學(xué)院 時(shí)間: 2025-3-22 18:27 作者: Negotiate 時(shí)間: 2025-3-22 21:27
Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fi discrete logarithm based public key cryptosystems. Depending on the type of application and implementation, the resulting schemes may be up to three times faster than the fastest known schemes of comparable security that use more conventional choices of subgroups or finite fields.作者: 種子 時(shí)間: 2025-3-23 03:27 作者: 交響樂(lè) 時(shí)間: 2025-3-23 05:36
On the security of self-synchronous ciphers,ditions, conventional synchronous stream ciphers suffer catastrophic message loss, whereas self-synchronous ciphers (SSCs) automatically re-synchronise after a short error burst, with no additional circuitry or protocols. In this paper we point out some security problems of SSCs which are unavoidabl作者: 注意到 時(shí)間: 2025-3-23 11:31 作者: 粗野 時(shí)間: 2025-3-23 15:50 作者: 不能平靜 時(shí)間: 2025-3-23 20:20 作者: 過(guò)多 時(shí)間: 2025-3-24 01:53 作者: 陳舊 時(shí)間: 2025-3-24 03:24 作者: Dignant 時(shí)間: 2025-3-24 09:28 作者: 碎石 時(shí)間: 2025-3-24 13:50
Yun Bai,Vijay Varadharajan has been sponsoring a noncritical compilation of metal complex formation constants and related equilibrium constants. This work was extensive in scope and resulted in publication of two large volumes of Stability Constants by the Chemical Society (London). The first volume, edited by L. G. Sillen (作者: Preamble 時(shí)間: 2025-3-24 16:26
Jonathon Tidswell,John Potter has been sponsoring a noncritical compilation of metal complex formation constants and related equilibrium constants. This work was extensive in scope and resulted in publication of two large volumes of Stability Constants by the Chemical Society (London). The first volume, edited by L. G. Sillen (作者: APEX 時(shí)間: 2025-3-24 21:07
Takayuki Tachikawa,Hiroaki Higaki,Makoto Takizawa has been sponsoring a noncritical compilation of metal complex formation constants and related equilibrium constants. This work was extensive in scope and resulted in publication of two large volumes of Stability Constants by the Chemical Society (London). The first volume, edited by L. G. Sillen (作者: 親密 時(shí)間: 2025-3-25 02:59
Masato Terada1,Yuko Murayama Chemistry has been sponsoring a noncritical compilation of metal complex formation constants and related equilibrium constants. This work was extensive in scope and resulted in publication of two large volumes of Stability Constants by the Chemical Society (London). The first volume, edited by L. G作者: 終止 時(shí)間: 2025-3-25 06:00 作者: 天然熱噴泉 時(shí)間: 2025-3-25 09:58 作者: ARENA 時(shí)間: 2025-3-25 13:19
Jussipekka Leiwo,Yuliang Zheng has been sponsoring a noncritical compilation of metal complex formation constants and related equilibrium constants. This work was extensive in scope and resulted in publication of two large volumes of Stability Constants by the Chemical Society (London). The first volume, edited by L. G. Sillen (作者: Endemic 時(shí)間: 2025-3-25 19:47 作者: Landlocked 時(shí)間: 2025-3-25 20:28
Marc Fischlin Chemistry has been sponsoring a noncritical compilation of metal complex formation constants and related equilibrium constants. This work was extensive in scope and resulted in publication of two large volumes of Stability Constants by the Chemical Society (London). The first volume, edited by L. G作者: Neonatal 時(shí)間: 2025-3-26 03:53 作者: 殘忍 時(shí)間: 2025-3-26 08:22
Xun Yi,Kwok-Yan Lam Chemistry has been sponsoring a noncritical compilation of metal complex formation constants and related equilibrium constants. This work was extensive in scope and resulted in publication of two large volumes of Stability Constants by the Chemical Society (London). The first volume, edited by L. G作者: BADGE 時(shí)間: 2025-3-26 11:08 作者: BLAND 時(shí)間: 2025-3-26 12:41 作者: 一條卷發(fā) 時(shí)間: 2025-3-26 17:57
Albert Sadowski Chemistry has been sponsoring a noncritical compilation of metal complex formation constants and related equilibrium constants. This work was extensive in scope and resulted in publication of two large volumes of Stability Constants by the Chemical Society (London). The first volume, edited by L. G作者: Small-Intestine 時(shí)間: 2025-3-26 22:42 作者: 侵蝕 時(shí)間: 2025-3-27 03:09 作者: Factorable 時(shí)間: 2025-3-27 09:01 作者: Embolic-Stroke 時(shí)間: 2025-3-27 11:17
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465401.jpg作者: indoctrinate 時(shí)間: 2025-3-27 16:25 作者: Affectation 時(shí)間: 2025-3-27 21:42 作者: 最低點(diǎn) 時(shí)間: 2025-3-27 23:09 作者: milligram 時(shí)間: 2025-3-28 04:10
A new hash function based on block cipher,me utilizes a single underlying block cipher and can completely resist target attack, collision attack and semi-free-start collision attack. The new scheme can be expected to have ideal computational security against five attacks when the underlying cipher is assumed to have no weakness.作者: 兩種語(yǔ)言 時(shí)間: 2025-3-28 08:33
Secret sharing with reusable polynomials,he reconstruction of multiple secrets, shareholders can dynamically join or leave without distributing new shares to the existing shareholders, and shares can be individually verified during both share distribution and secret recovery.作者: Eructation 時(shí)間: 2025-3-28 13:56 作者: 逗它小傻瓜 時(shí)間: 2025-3-28 17:25
Prospectives for modelling trust in information security,This paper describes trust in information security as a subjective human belief. On this background, four formal models for trust which have been proposed in the recent years are analysed with the purpose of determining their strong and weak sides. From this we try to define general criteria for the feasibility of modelling trust.作者: 臭了生氣 時(shí)間: 2025-3-28 19:09
Analysis and implementation of a formal authorization policy design approach,In [1], we proposed a formal approach to specify authorization policies and their transformations. In this paper, we discuss the implementation issues of this approach and analyse the complexities of the algorithms introduced.作者: FOR 時(shí)間: 2025-3-29 00:23
Practical memory checkers for stacks, queues and deques,A memory checker for a data structure provides a method to check that the output of the data structure operations is consistent with the input even if the data is stored on some insecure medium. In作者: 無(wú)可非議 時(shí)間: 2025-3-29 04:43 作者: 虛情假意 時(shí)間: 2025-3-29 08:48 作者: legitimate 時(shí)間: 2025-3-29 11:59
978-3-540-63232-0Springer-Verlag Berlin Heidelberg 1997作者: eczema 時(shí)間: 2025-3-29 17:47
Information Security and Privacy978-3-540-69237-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 鞭子 時(shí)間: 2025-3-29 23:02
,Trusted third parties for secure electronic commerce — Are they needed,作者: 發(fā)現(xiàn) 時(shí)間: 2025-3-30 03:51 作者: majestic 時(shí)間: 2025-3-30 05:40
Inefficiency of variant characteristics for substitution-permutation networks with position permutaIt is necessary to emphasize that applying the position permutations in the SPN does not change the type of algorithm; it is still the substitution-permutation network..Differential cryptanalysis of the SPNs with the position permutations can be made with use of so called .. In this paper we show th作者: 抒情短詩(shī) 時(shí)間: 2025-3-30 09:07 作者: 破布 時(shí)間: 2025-3-30 14:45 作者: creatine-kinase 時(shí)間: 2025-3-30 17:22 作者: CAMEO 時(shí)間: 2025-3-30 22:05
Yun Bai,Vijay Varadharajanmplex equilibria (heats, entropies, and free energies). Most recently a noncritical compilation of organic ligands by D. D. Perrin (Pergamon Press) extended coverage of the literature through 1973 and a similar volume for inorganic ligands by E. Hogfeldt covered through 1974. Since it was the policy作者: 下垂 時(shí)間: 2025-3-31 01:26 作者: 步履蹣跚 時(shí)間: 2025-3-31 08:00 作者: 不持續(xù)就爆 時(shí)間: 2025-3-31 11:22 作者: FLIP 時(shí)間: 2025-3-31 15:36 作者: 使閉塞 時(shí)間: 2025-3-31 19:42
Vijay Varadharajan,Rajan Shankaran,Michael Hitchensmplex equilibria (heats, entropies, and free energies). Most recently a noncritical compilation of organic ligands by D. D. Perrin (Pergamon Press) extended coverage of the literature through 1973 and a similar volume for inorganic ligands by E. Hogfeldt covered through 1974. Since it was the policy作者: anachronistic 時(shí)間: 2025-4-1 00:58 作者: committed 時(shí)間: 2025-4-1 02:39 作者: 心胸開(kāi)闊 時(shí)間: 2025-4-1 08:21 作者: epicardium 時(shí)間: 2025-4-1 10:59 作者: 沒(méi)花的是打擾 時(shí)間: 2025-4-1 15:53 作者: 大包裹 時(shí)間: 2025-4-1 21:08