標(biāo)題: Titlebook: Information Security and Privacy; 8th Australasian Con Rei Safavi-Naini,Jennifer Seberry Conference proceedings 2003 Springer-Verlag Berlin [打印本頁] 作者: coherent 時間: 2025-3-21 16:18
書目名稱Information Security and Privacy影響因子(影響力)
書目名稱Information Security and Privacy影響因子(影響力)學(xué)科排名
書目名稱Information Security and Privacy網(wǎng)絡(luò)公開度
書目名稱Information Security and Privacy網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Security and Privacy被引頻次
書目名稱Information Security and Privacy被引頻次學(xué)科排名
書目名稱Information Security and Privacy年度引用
書目名稱Information Security and Privacy年度引用學(xué)科排名
書目名稱Information Security and Privacy讀者反饋
書目名稱Information Security and Privacy讀者反饋學(xué)科排名
作者: 臆斷 時間: 2025-3-21 22:42 作者: 群居男女 時間: 2025-3-22 02:27
Shigeki Kitazawa,Masakazu Soshi,Atsuko Miyajiforms on the rational and emotional properties. Both the online questionnaire and questionnaire in paper copy have been implemented simultaneously in this experiment for two weeks. In the end 230 online questionnaires and 220 paper copies of questionnaires have been collected, and there are 417 vali作者: patriarch 時間: 2025-3-22 06:11 作者: BIAS 時間: 2025-3-22 10:36 作者: 連系 時間: 2025-3-22 16:24 作者: 同來核對 時間: 2025-3-22 20:25
Yvonne Hitchcock,Paul Montague,Gary Carter,Ed Dawsonborative guidance in graduation project, the study divided it into experimental group and control group to compare and analyze data. The “experimental group” is composed of the students who completed the graduation project of the whole semester through the collaborative guidance of computer-supporte作者: 幾何學(xué)家 時間: 2025-3-22 21:27 作者: Gudgeon 時間: 2025-3-23 05:02 作者: 不可接觸 時間: 2025-3-23 08:04 作者: 擴大 時間: 2025-3-23 13:18 作者: 小步走路 時間: 2025-3-23 16:29
Chien-Ning Chen,Sung-Ming Yeneen them. Based on an empirical analysis of 130 manufacturing industry firms, strategic agility was found to have a complete mediating effect between design strategy and new product development performance as well as a positive impact on design strategy operation. The preliminary model established i作者: 抵押貸款 時間: 2025-3-23 21:51 作者: 非實體 時間: 2025-3-23 23:48
Masahiko Takenaka,Takeshi Shimoyama,Takeshi Koshiba 10 prominent Taiwan cultural products selected from the domestic market. The results of the study suggested that Hume’s theory of seven fundamental relations could be applied to interpret the connections between impressions and ideas regarding viewers’ perception of the cultural features of a produ作者: 重力 時間: 2025-3-24 04:30
Libin Wang,Kefei Chen This paper mainly expounds the design of innovative products based on trans-boundary characteristics of the traditional arts, for instance, the aesthetic orientation in the pursuit of humanistic spirit, convenience of high-tech, selectivity of environment and eco-material, and guidance of scientifi作者: 中止 時間: 2025-3-24 10:00
Yiu Shing Terry Tin,Colin Boyd,Juan Manuel González Nieto and Semantic Differential Method, to evaluate viewers feedback in products, interactive, service, brand four dimensions on the basis of investigation and questionnaire research. With the integration of the above principles, this study defines cultural derivative design with a new logic, clarifies t作者: 酷熱 時間: 2025-3-24 13:04 作者: 膠狀 時間: 2025-3-24 17:23
Arvind Narayanan,C. Pandu Rangan,Kwangjo Kime development process results in a game-based education program that serve both the interests of the promoting bodies and the intended audience. In the program, we incorporate three types of ICH originated locally in Suzhou. This paper, therefore, presents the design rationale and development proces作者: 不可侵犯 時間: 2025-3-24 19:54 作者: Priapism 時間: 2025-3-25 01:39
Tao Peng,Christopher Leckie,Kotagiri Ramamohanarao (CFA) was used to evaluate MSPSS. Its index includes chi2 inspection results, root mean square error of approximation (RMSEA) and normed fit index (NFI) to compare fit index and non-normed fit index. To ensure its validity at the same time, MBI-PPD MSPSS in Chinese version was used to understand th作者: Accrue 時間: 2025-3-25 06:26
https://doi.org/10.1007/3-540-45067-Xcryptography; data security; digital; information; privacy; security; algorithm analysis and problem compl作者: Dendritic-Cells 時間: 2025-3-25 07:30
978-3-540-40515-3Springer-Verlag Berlin Heidelberg 2003作者: LUMEN 時間: 2025-3-25 12:41
Information Security and Privacy978-3-540-45067-2Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Leisureliness 時間: 2025-3-25 16:38
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465430.jpg作者: Fortuitous 時間: 2025-3-25 23:00
On the Pseudorandomness of KASUMI Type PermutationsKASUMI is a block cipher which has been adopted as a standard of 3GPP. In this paper, we study the pseudorandomness of idealized KASUMI type permutations for adaptive adversaries. We show that作者: Overthrow 時間: 2025-3-26 00:17 作者: 訓(xùn)誡 時間: 2025-3-26 05:06
The Unsolvable Privacy Problem and Its Implications for Security Technologiesat there are strong incentives for decreasing privacy, rooted in the economic benefits of price discrimination. As a result, the privacy problem is unsolvable. The conflict between incentives to price discriminate and the public dislike of this practice will influence what security technologies are likely to succeed.作者: ICLE 時間: 2025-3-26 09:26
An Addition Algorithm in Jacobian of , , Curve the forms of Groebner bases of all ideals involved in the addition in Jacobian, and by computing Groebner bases of ideals without using Buchberger algorithm. The algorithm computes the addition in Jacobian of C. curves in about 3 times amount of computation of the one in elliptic curves, when the sizes of groups are set to be the same.作者: cardiopulmonary 時間: 2025-3-26 16:29
Differential Fault Analysis on AES Key Schedule and Some Countermeasures It efficiently finds the key of AES-128 with feasible computation and less than thirty pairs of correct and faulty ciphertexts. Several countermeasures are also proposed. This weakness can be resolved without modifying the structure of the AES algorithm and without decreasing the efficiency.作者: Cardiac 時間: 2025-3-26 17:29 作者: 翻動 時間: 2025-3-27 00:27 作者: Conserve 時間: 2025-3-27 01:51 作者: 安定 時間: 2025-3-27 08:16 作者: 基因組 時間: 2025-3-27 13:03 作者: Wordlist 時間: 2025-3-27 14:33
The Security of Fixed versus Random Elliptic Curves in Cryptographyon of the expected time remaining to solve an ECDLP when a given size of precomputation is available. We conclude that adding 5 bits to the size of a fixed curve to avoid general software attacks and an extra 6 bits to avoid attacks on special moduli and . parameters provides an equivalent level of security.作者: resistant 時間: 2025-3-27 21:07
Cryptanalysis of the Full Version Randomized Addition-Subtraction Chainsard 163-bit keys, the success probability for the simple version with . AD sequences is about 94% and with . AD sequences is about 99%. Also, the success probability for the complex version with . AD sequences is about 94% and with . AD sequences is about 99%.作者: 提升 時間: 2025-3-27 23:45 作者: 懸掛 時間: 2025-3-28 06:08
Evaluation of Anonymity of Practical Anonymous Communication Networksan provide anonymity efficiently in terms of computational complexity. Unfortunately, we can show that it is diffi- cult to build efficient anonymous networks only by means of deterministic approaches. We also run simulation experiments and discuss the results.作者: 四目在模仿 時間: 2025-3-28 07:47
Theoretical Analysis of η2 Attack on RC6etical security evaluation against η. attack was known, it has been done by computer experiments. We should note that this is the first results that a theoretical evaluation against η. attack is shown.作者: EPT 時間: 2025-3-28 14:18 作者: geriatrician 時間: 2025-3-28 14:59 作者: demote 時間: 2025-3-28 20:05 作者: chisel 時間: 2025-3-28 23:18 作者: IRATE 時間: 2025-3-29 06:02
A Typed Theory for Access Control and Information Flow Control in Mobile Systemslaborate a framework of . to construct the secure information flow property named as .. Moreover, some results are presented to indicate that our theory is an efficient enforceable model to support the specification and analysis of secure mobile systems.作者: ascetic 時間: 2025-3-29 08:26
Practical Pay TV Schemes memory. There is also no upper limit on the number of subscribers. We extend this scheme to have the . property: If a collusion of less than . users crack their . and produce a new decryption key, the . of crackers can be efficiently identified with high probability. This property is similar to but different from the . schemes of Chor et al [.].作者: 拉開這車床 時間: 2025-3-29 15:03
Cooperative Routers against DoS Attacksnt a protocol which can identify the attacker of DoS by the request of victim in cooperation of routers on the attacking path between a victim and the attacker. The performance of our protocol will be verified by simulations and the experiments show that it takes considerably small time to identify the location of attacker.作者: mechanical 時間: 2025-3-29 15:57 作者: 南極 時間: 2025-3-29 22:19
me research has studied how Facebook affects users’ social capital. This study examines users’ language selection behaviors and analyzes their selections by applying the concept of cultural capital. It aims to provide information to designers to develop cross-cultural applications or web pages on Fa作者: Confidential 時間: 2025-3-29 23:58
Laurence Bull,David McG. Squire,Jan Newmarch,Yuliang Zhengveys on 13 dechnology (a portmanteau word of design and technology) products, this study aimed to understand the preferences and the characteristics of a specific online virtual community—the Internet and technology enthusiasts group. The study results revealed that the Internet and technology enthu作者: Chauvinistic 時間: 2025-3-30 04:58
Shigeki Kitazawa,Masakazu Soshi,Atsuko Miyaji determining product personality. Rational and emotional are the two opposite adjectives with the most resonance during interpretation of the properties of product forms. Among the researches on form ratio, the golden ratio is the most historic. In this study the questionnaire survey of two group va作者: PRE 時間: 2025-3-30 12:15
Pino Persiano,Ivan Viscontitural and fitness activities. ..) of Xishan, Wuxi, China to offer a service which help the residents, especially the elders, to do fitness in a healthy and social interactive way. It aims not only to improve physical health but also to build up a friendly relationship among the neighbors..This servi作者: 巧辦法 時間: 2025-3-30 14:06 作者: 多山 時間: 2025-3-30 20:04 作者: 無聊的人 時間: 2025-3-30 21:15
Yvonne Hitchcock,Paul Montague,Gary Carter,Ed Dawsonferent groups through “collaborative guidance” and “mentor guidance”. The main study methods are multi-factor experimental design, among which, the main variables are gender grouping, and the dependent variables are “mentor guidance” and “collaborative guidance”. The collaborative guidance means tha作者: 較早 時間: 2025-3-31 03:11 作者: 污穢 時間: 2025-3-31 06:12 作者: 馬賽克 時間: 2025-3-31 11:22
Seigo Arita of them were discussed about the conflicts or problems among different R&D functions within NPD process. Whereas in product development practices, companies of ICT (information, computer, technology) industries have focused on quality issues in NPD with three stages as known as EVT, DVT and PVT. De作者: 健談 時間: 2025-3-31 16:24 作者: disrupt 時間: 2025-3-31 20:59
Chien-Ning Chen,Sung-Ming Yeneen introduced in the management field to improve the flexibility and effectiveness of internal decision-making in an enterprise and to promote the performance of new product development while maintaining product innovation. However, compared with the business model innovation, few studies in the ma作者: xanthelasma 時間: 2025-4-1 00:28 作者: crutch 時間: 2025-4-1 04:35 作者: debouch 時間: 2025-4-1 08:38 作者: 避開 時間: 2025-4-1 10:15
Yiu Shing Terry Tin,Colin Boyd,Juan Manuel González Nietohe rapid development of social new media, there are more and more ways to spread culture, and the innovative development of cultural derivatives has become one of the important links. Excellent cultural derivatives can greatly improve the status of culture in social groups and establish regional cul