標(biāo)題: Titlebook: Information Security and Privacy; 21st Australasian Co Joseph K. Liu,Ron Steinfeld Conference proceedings 2016 Springer International Publi [打印本頁] 作者: IU421 時間: 2025-3-21 20:00
書目名稱Information Security and Privacy影響因子(影響力)
書目名稱Information Security and Privacy影響因子(影響力)學(xué)科排名
書目名稱Information Security and Privacy網(wǎng)絡(luò)公開度
書目名稱Information Security and Privacy網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Security and Privacy被引頻次
書目名稱Information Security and Privacy被引頻次學(xué)科排名
書目名稱Information Security and Privacy年度引用
書目名稱Information Security and Privacy年度引用學(xué)科排名
書目名稱Information Security and Privacy讀者反饋
書目名稱Information Security and Privacy讀者反饋學(xué)科排名
作者: FUME 時間: 2025-3-21 20:24
eld at Beijing in October 1984. The anther culture has now become a common method for obtaining haploid or pollen plants, though other means of experimental induction of rice haploids have also been worked out with the culture of unpollinated ovaries (C. Zhou and Yang 1980a, 1981, Kuo 1982).作者: 單調(diào)女 時間: 2025-3-22 01:52
Rongmao Chen,Yi Mu,Willy Susilo,Guomin Yang,Fuchun Guo,Mingwu Zhangeld at Beijing in October 1984. The anther culture has now become a common method for obtaining haploid or pollen plants, though other means of experimental induction of rice haploids have also been worked out with the culture of unpollinated ovaries (C. Zhou and Yang 1980a, 1981, Kuo 1982).作者: candle 時間: 2025-3-22 07:30
Shengmin Xu,Guomin Yang,Yi Mu,Sha Maof this Vol.). There are three steps by which new wheat cultivars can be developed. The first step is to introduce variation by inter- or intraspecific sexual hybridization, or to induce mutations or transformations. The second step is to recover homozygous progeny by repeated generations of self-po作者: 過份 時間: 2025-3-22 11:20
Arcangelo Castiglione,Alfredo De Santis,Barbara Masucci,Francesco Palmieri,Aniello Castiglionentinuous scientific endeavour to improve plant char- acters using a wide range of possibilities, and it also implies a scrutiny of the materials and methods available in the world today.978-3-642-64889-2978-3-642-61625-9Series ISSN 0934-943X Series E-ISSN 2512-3696 作者: Audiometry 時間: 2025-3-22 16:43 作者: 幸福愉悅感 時間: 2025-3-22 20:04 作者: 做方舟 時間: 2025-3-23 01:18 作者: 克制 時間: 2025-3-23 04:56
on whether or not it gets us nearer to it.’1 The genuinely open road and the visibly classless culture were Crosland’s ultimate goal; equalisation through State intervention and upgrading through economic growth were Crosland’s proximate means - and the name of the package was to be socialism.作者: 尊重 時間: 2025-3-23 07:00
Tong Li,Zheli Liu,Ping Li,Chunfu Jia,Zoe L. Jiang,Jin Lion whether or not it gets us nearer to it.’1 The genuinely open road and the visibly classless culture were Crosland’s ultimate goal; equalisation through State intervention and upgrading through economic growth were Crosland’s proximate means - and the name of the package was to be socialism.作者: CEDE 時間: 2025-3-23 12:42 作者: Serenity 時間: 2025-3-23 15:42
Shiwei Zhang,Guomin Yang,Yi Mud reasons. In fact, we discovered that the Polish associational field has older roots than the Indian one: it was established primarily during the immediate post-war period. In addition, contrary to what the perceived cultural ‘proximity’ led us to believe, Polish organizations tend to be more dista作者: PANG 時間: 2025-3-23 21:37 作者: 捕鯨魚叉 時間: 2025-3-24 02:13
nserfolges werten. Vor dem Hintergrund dieser Diskussion stehen die ?konomischen Konsequenzen für Anbieter, die mittels der Instrumente des Kundenbeziehungsmanagements diese Gesch?ftsbeziehung aufbauen und erhalten m?chten, auf dem Prüfstand. Die Wirkungsanalyse dieser Ma?nahmen über die vor?konomis作者: evaculate 時間: 2025-3-24 05:18 作者: Magnificent 時間: 2025-3-24 06:54 作者: Indict 時間: 2025-3-24 13:53 作者: 檢查 時間: 2025-3-24 18:48
Identity-Based Group Encryptionted with his identity; and the user can register his identity as a group member to a group manager without leaking his secret key. Then anyone can send confidential messages to the group member without leaking the group member’s identity. However, the group manager can trace the receiver if a disput作者: Contend 時間: 2025-3-24 20:55
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storagetaining such a key, a user can use it not only for generating a single trapdoor as a keyword search query, but for verifying whether the server just conducts a part of computing for the search request. Then, we define the requirements of the scheme and give a valid construction. Finally, our analysi作者: capsaicin 時間: 2025-3-25 00:01
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Securityas a building block, we propose a generic IBBE construction, which can simultaneously ensure the confidentiality and anonymity under chosen-ciphertext attacks. Our generic IBBE construction has a desirable property that the public parameters size, the private key size and the decryption cost are con作者: certitude 時間: 2025-3-25 03:40 作者: GAVEL 時間: 2025-3-25 10:45 作者: 排出 時間: 2025-3-25 15:17
Jianchang Lai,Yi Mu,Fuchun Guo,Willy Susilo,Rongmao Chene verschiedenen Anforderungen der europ?ischen Arzthaftung auf. Die in diesem Band versammelten Beitr?ge des XX. K?lner Symposiums der Arbeitsgemeinschaft Recht978-3-642-04404-5978-3-642-04405-2Series ISSN 1431-1151 作者: HACK 時間: 2025-3-25 17:29
0302-9743 y and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random / One-Way Function..978-3-319-40366-3978-3-319-40367-0Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: achlorhydria 時間: 2025-3-25 19:58 作者: Rodent 時間: 2025-3-26 00:35
Tran Viet Xuan Phuong,Guomin Yang,Willy Susilo,Kaitai Liang作者: 落葉劑 時間: 2025-3-26 04:47
Shi-Feng Sun,Udaya Parampalli,Tsz Hon Yuen,Yu Yu,Dawu Gu作者: 不如屎殼郎 時間: 2025-3-26 08:27 作者: Magisterial 時間: 2025-3-26 15:31
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465421.jpg作者: 輕推 時間: 2025-3-26 19:23 作者: CAND 時間: 2025-3-26 22:31
978-3-319-40366-3Springer International Publishing Switzerland 2016作者: 結(jié)束 時間: 2025-3-27 04:57
Information Security and Privacy978-3-319-40367-0Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 憤憤不平 時間: 2025-3-27 08:06 作者: 圍巾 時間: 2025-3-27 13:19 作者: reperfusion 時間: 2025-3-27 13:47
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptionsnear Diffie-Hellman assumption. Since the schemes are constructed in a direct way instead of relying on the non-interactive zero knowledge proof or signature techniques, they not only achieve the strong security notions but also have better performances.作者: 改變 時間: 2025-3-27 18:11
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharingxt and the revocation process does not reveal any information of the plaintext and receiver identity. In our proposed scheme, the group of receiver identities are anonymous and only known by the encryptor. We prove that our scheme is semantically secure in the random oracle model.作者: Functional 時間: 2025-3-27 23:41
0302-9743 onference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016...The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully reviewed and selected from 176 submissions. The papers of Part I (LNCS 972作者: Nomadic 時間: 2025-3-28 04:22 作者: custody 時間: 2025-3-28 09:02
Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometrynal benefits: (1) our proposed method avoids the technical obstacle of computing inverses in the group whose order is unknown; (2) it gains computational advantages over Shoup’s trick and it can be used as a general building block to design secure and efficient threshold cryptosystems based on factoring.作者: 單純 時間: 2025-3-28 10:59
Edit Distance Based Encryption and Its Application evaluate the edit distance between two strings embedded in the ciphertext and the secret key. We also show an interesting application of our EDE scheme named Fuzzy Broadcast Encryption which is very useful in a broadcasting network.作者: ESO 時間: 2025-3-28 18:12
Public Key Encryption with Authorized Keyword Searchconsiderably. This property makes our PEAKS quite useful when the authorized token needs to be frequently updated with time for security purpose. The semantical security against chosen keyword attack and trapdoor unforgeability are formally proved.作者: 濕潤 時間: 2025-3-28 22:24 作者: bifurcate 時間: 2025-3-28 23:09 作者: 無彈性 時間: 2025-3-29 03:13
Proxy Signature with Revocation his/her signing right to a proxy signer (or a group of proxy signers) who can then sign documents on behalf of the original signer. In this paper, we investigate the problem of proxy signature with revocation. The revocation of delegated signing right is necessary for a proxy signature scheme when 作者: 我們的面粉 時間: 2025-3-29 10:28
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structuigher classes can be employed to derive the keys of classes lower down in the hierarchy. A hierarchical key assignment scheme for . allows to make dynamic updates to the hierarchy, such as addition, deletion and modification of classes and relations among them, as well as the revocation of users..In作者: 范例 時間: 2025-3-29 14:27
Content-Based Encryptionen network. Unlike the TCP/IP network topology, which is address-driven, content-centric networks do not require any address. Based on the content-to-consumer paradigm, content-centric networking architecture was proposed for the content to be provided efficiently with great convenience to users. As作者: faucet 時間: 2025-3-29 18:32
Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometrytext. It is a useful building block in cryptology to distribute the trust of the secret key as well as increase availability. In particular, threshold Paillier encryption has been widely used in various security protocols, such as e-auction, e-voting and e-lottery. In this paper, we present the idea作者: antecedence 時間: 2025-3-29 20:30 作者: Itinerant 時間: 2025-3-30 01:33 作者: 堅毅 時間: 2025-3-30 04:51
Proxy Re-encryption with Delegatable Verifiability a result, proxy re-encryption has increased utility, and can be used in a number of fields including cloud computing. In previous proxy re-encryption schemes, a proxy is assumed to follow the protocol explicitly. However, this is far from the norm, and the assumption is not always true, especially 作者: indifferent 時間: 2025-3-30 10:55 作者: 裙帶關(guān)系 時間: 2025-3-30 14:13
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storageal searchable encryption technique can provide the privacy protection, two critical issues still should be considered. Firstly, a cloud server may be selfish in order to save its computing resources, and thus returns only a fragment of results to reply a search query. Secondly, since different keys 作者: 外來 時間: 2025-3-30 17:48
Public Key Encryption with Authorized Keyword Searchagainst disclosure while making it searchable. In this paper, we propose a new cryptographic primitive called public key encryption with authorized keyword search (PEAKS). In PEAKS, keywords are encrypted with one public key and users without corresponding secret key need authorization from the auth作者: 犬儒主義者 時間: 2025-3-30 23:00
Linear Encryption with Keyword Searchfiles are usually encrypted, which makes them difficult to be searched by remote servers. It is also harder to efficiently share encrypted data in the cloud than those in plaintext. In this paper, we develop a searchable encryption framework called . (LEKS) that can semi-generically convert some exi作者: opalescence 時間: 2025-3-31 01:38
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Securityr own private key to correctly decrypt the broadcast ciphertext, while the users outside . cannot. Identity-based broadcast encryption (IBBE) system is a variant of broadcast encryption system where any string representing the user’s identity (e.g., email address) can be used as his/her public key. 作者: lacrimal-gland 時間: 2025-3-31 08:48 作者: FRONT 時間: 2025-3-31 09:29
ntegration of soil, plant and environmental interactions for climate smart agriculture. This book covers aspects of application of Decision Support System for Agrotechnology Transfer (DSSAT) for climate smart agriculture. Step-by-step details of application of modelling approaches used for various c