標(biāo)題: Titlebook: Information and Communications Security; 9th International Co Sihan Qing,Hideki Imai,Guilin Wang Conference proceedings 2007 Springer-Verla [打印本頁(yè)] 作者: sprawl 時(shí)間: 2025-3-21 16:30
書(shū)目名稱(chēng)Information and Communications Security影響因子(影響力)
書(shū)目名稱(chēng)Information and Communications Security影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Information and Communications Security網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Information and Communications Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Information and Communications Security被引頻次
書(shū)目名稱(chēng)Information and Communications Security被引頻次學(xué)科排名
書(shū)目名稱(chēng)Information and Communications Security年度引用
書(shū)目名稱(chēng)Information and Communications Security年度引用學(xué)科排名
書(shū)目名稱(chēng)Information and Communications Security讀者反饋
書(shū)目名稱(chēng)Information and Communications Security讀者反饋學(xué)科排名
作者: dandruff 時(shí)間: 2025-3-21 23:00 作者: 有助于 時(shí)間: 2025-3-22 02:23 作者: convert 時(shí)間: 2025-3-22 06:46 作者: Bravura 時(shí)間: 2025-3-22 10:26 作者: 盡責(zé) 時(shí)間: 2025-3-22 15:14
Dennis Y. W. Liu,Duncan S. Wong,Xinyi Huang,Guilin Wang,Qiong Huang,Yi Mu,Willy Susiloders the findings of the NERUPI (Network Evaluating and Researching University Participation Interventions) CSCS research project in relation to legal curricula generally and the legal curriculum at The University of Law (ULaw) in particular. It explores the various approaches to law as a discipline作者: 駕駛 時(shí)間: 2025-3-22 18:47 作者: 放肆的你 時(shí)間: 2025-3-22 21:14 作者: Ige326 時(shí)間: 2025-3-23 03:24
Peishun Wang,Huaxiong Wang,Josef Pieprzykhat society demands the repression of certain sexual and aggressive drives—which he linked with the development of the neurotic form of human suffering. The global response to the pandemic, from the vantage point of summer 2020, was quite varied. Psychoanalytic formulations provided a different lens作者: 價(jià)值在貶值 時(shí)間: 2025-3-23 06:53 作者: Carcinoma 時(shí)間: 2025-3-23 11:25
ion of issues including race, climate change and partisanshi.In this book, Thomas Svolos tests the claim that a practicing psychoanalyst is afforded a unique perspective on issues of politics, social and cultural affairs, trained, as they are, to look out for that which is not readily transparent to作者: 高度贊揚(yáng) 時(shí)間: 2025-3-23 14:41 作者: arsenal 時(shí)間: 2025-3-23 21:31
Xiaoming Zhang,Xiong Yinion of issues including race, climate change and partisanshi.In this book, Thomas Svolos tests the claim that a practicing psychoanalyst is afforded a unique perspective on issues of politics, social and cultural affairs, trained, as they are, to look out for that which is not readily transparent to作者: 河潭 時(shí)間: 2025-3-23 23:50 作者: Fibrinogen 時(shí)間: 2025-3-24 04:21 作者: 混亂生活 時(shí)間: 2025-3-24 09:13 作者: Fillet,Filet 時(shí)間: 2025-3-24 13:40 作者: 難聽(tīng)的聲音 時(shí)間: 2025-3-24 16:14 作者: 吞下 時(shí)間: 2025-3-24 22:09 作者: FACET 時(shí)間: 2025-3-25 02:46
Formal Definition and Construction of Nominative Signatureation proposed; second, there is no formal security model available; and third, there is no proven secure scheme constructed, given that all the previous schemes have already been found flawed. In this paper, we give positive answers to these problems. First, we illustrate that nominative signature 作者: 土產(chǎn) 時(shí)間: 2025-3-25 05:21 作者: 腐蝕 時(shí)間: 2025-3-25 07:45
(Convertible) Undeniable Signatures Without Random Oracles were proposed in Eurocrypt 2005. The security of our scheme is based on the CDH and the decision linear assumption. Comparing only the part of undeniable signatures, our scheme uses more standard assumptions than the existing undeniable signatures without random oracles due to Laguillamie and Vergn作者: insincerity 時(shí)間: 2025-3-25 14:57 作者: 記成螞蟻 時(shí)間: 2025-3-25 15:51
Preventing Unofficial Information Propagationied, or manipulated digital documents propagates the documents over the Internet and/or distributes those through physical distribution channels many challenges arise which document holders must overcome in order to mitigate the impact to their privacy or business. This paper focuses on the propagat作者: 時(shí)間等 時(shí)間: 2025-3-25 20:38
Privacy Protection on Multiple Sensitive Attributes about an individual, the protection of multiple sensitive attributes has become an important problem. Different from the existing models of single sensitive attribute, extra associations among multiple sensitive attributes should be invested. Two kinds of disclosure scenarios may happen because of 作者: 羊欄 時(shí)間: 2025-3-26 00:54 作者: tariff 時(shí)間: 2025-3-26 07:26
A Semi-blind Watermarking Based on Discrete Wavelet Transformtication. The proposed scheme employed toral automorphism to scramble the host image and the watermark so as to enhance the security and fidelity of the embedded watermark. Later, the permuted watermark and the permuted host image were transformed by discrete wavelet transform. Next, the transformed作者: JIBE 時(shí)間: 2025-3-26 08:31
On the Design of Fast Prefix-Preserving IP Address Anonymization Schemeerve prefix relationship after anonymization. To facilitate research on real time high speed network traffic, address anonymization algorithm should be fast and consistent. In this paper, the bit string based algorithm and the embedded bit string algorithm will be introduced. Bit string based algori作者: 在前面 時(shí)間: 2025-3-26 13:03 作者: 產(chǎn)生 時(shí)間: 2025-3-26 17:12 作者: 不愛(ài)防注射 時(shí)間: 2025-3-26 21:37 作者: 真 時(shí)間: 2025-3-27 04:05
Boudot’s Range-Bounded Commitment Scheme Revisitediation (CFT Proof). Based on CFT, Boudot presented a popular range-bounded commitment scheme in Eurocrypt’2000. Both CFT Proof and Boudot Proof are based on the encryption ., where . is an RSA modulus whose factorization is . by the prover. They did not use a single base as usual. Thus an increase i作者: 錫箔紙 時(shí)間: 2025-3-27 07:27 作者: LATHE 時(shí)間: 2025-3-27 13:08
978-3-540-77047-3Springer-Verlag Berlin Heidelberg 2007作者: creatine-kinase 時(shí)間: 2025-3-27 15:52
Information and Communications Security978-3-540-77048-0Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: giggle 時(shí)間: 2025-3-27 18:06
0302-9743 Overview: 978-3-540-77047-3978-3-540-77048-0Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: RAGE 時(shí)間: 2025-3-28 00:58
https://doi.org/10.1007/978-3-540-77048-0AES; DoS attacks; access control; communication; cryptanalysis; cryptographic protocols; cryptography; digi作者: 兇猛 時(shí)間: 2025-3-28 03:26 作者: 審問(wèn),審訊 時(shí)間: 2025-3-28 10:02 作者: Geyser 時(shí)間: 2025-3-28 14:10 作者: Galactogogue 時(shí)間: 2025-3-28 18:15 作者: 凹槽 時(shí)間: 2025-3-28 21:00
On the Design of Fast Prefix-Preserving IP Address Anonymization Schemethm uses precomputed bit string to improve the anonymization performance. Instead of only using the LSB of each Rijndael output, the embedded bit string algorithm will take advantage of the full size Rijndael output to anonymize several bits at the same time. The implementation can be downloaded from https://sourceforge.net/projects/ipanon.作者: 光亮 時(shí)間: 2025-3-28 22:54
MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Seture by .. The experimental results demonstrate that MDH can improve matching performance by 100% to 300% comparing with other popular algorithms, whereas the memory requirement stays in a comparatively low level.作者: EPT 時(shí)間: 2025-3-29 06:30
A New Dynamic Accumulator for Batch Updates dynamic accumulator for batch updates based on the Paillier cryptosystem. Our construction makes a batch of update operations at unit cost. We prove its security under the extended strong RSA (es-RSA) assumption.作者: 卷發(fā) 時(shí)間: 2025-3-29 09:56 作者: cumulative 時(shí)間: 2025-3-29 15:00
PAKE,: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.(log.). Additionally, the hierarchical feature of .PAKE. enables every subgroup obtains their own subgroup key in the end. We also prove the security of our protocol under the random oracle model and the ideal cipher model.作者: JIBE 時(shí)間: 2025-3-29 15:45
Formal Definition and Construction of Nominative Signatureropose a formal definition and adversarial model for nominative signature. Third, we show that Chaum’s undeniable signature can be transformed to an efficient nominative signature by simply using a standard signature. The security of our transformation can be proven under the standard number-theoretic assumption.作者: Accede 時(shí)間: 2025-3-29 22:59
Preventing Unofficial Information Propagationnd the Platform for Privacy Preferences (P3P) assumes that qualified or certified credential viewers are honest and reliable. The proposed approach in this paper uses short-lived credentials based on reverse forward secure signatures to remove this assumption and mitigate the damage caused by a dishonest or honest but compromised viewer.作者: debouch 時(shí)間: 2025-3-30 00:26 作者: 疲憊的老馬 時(shí)間: 2025-3-30 06:53 作者: archaeology 時(shí)間: 2025-3-30 09:51 作者: 專(zhuān)橫 時(shí)間: 2025-3-30 16:22
Charalampos Papamanthou,Roberto Tamassiant to gain deeper insights into the theoretical modelling of young children in early childhood settings involving the scientific concept of light. Importantly, the advantageous use of digital tools will be explained as a method enabling researchers to actively apply other creative tools and to parti作者: endure 時(shí)間: 2025-3-30 20:09
Lan Zhou,Willy Susilo,Yi Muble to develop new understanding of inclusion and to understand how participant children created roundabout ways for their inclusion in the preschool practices. A model accompanied by five key principles are presented, and a working example illustrates the kind of data generated.作者: 使苦惱 時(shí)間: 2025-3-30 22:29
Zhiguo Wan,Robert H. Deng,Feng Bao,Bart Preneelting conditions to support teachers’ meaningful professional development and promote professional agency. The hybrid educational experiment also enables researchers to understand the process of teachers’ professional development and traverses the complex, shifting and uncertain areas of pedagogical 作者: Project 時(shí)間: 2025-3-31 04:26 作者: 使害羞 時(shí)間: 2025-3-31 08:20
Dennis Y. W. Liu,Duncan S. Wong,Xinyi Huang,Guilin Wang,Qiong Huang,Yi Mu,Willy Susiloe neutrality of them may also prevent representation and obstruct important contextual learning and critical discussion. The case study details how the CSCS scales were implemented at ULaw, how the findings led to practical change and provides recommendations for further work in developing culturall作者: ethereal 時(shí)間: 2025-3-31 12:13 作者: 配偶 時(shí)間: 2025-3-31 15:58 作者: 雇傭兵 時(shí)間: 2025-3-31 19:48
Peishun Wang,Huaxiong Wang,Josef Pieprzykrus as an external threat. The loss of a place of a single, universal master that had some dominant role in society—most clearly in the position of Emperor—was replaced with a swarm of figures wanting to take the role of master, as was also seen in the United States. The absence of a symbolic father作者: 不能平靜 時(shí)間: 2025-3-31 22:31
Zhengyi Le,Yi Ouyang,Yurong Xu,James Ford,Fillia Makedonrus as an external threat. The loss of a place of a single, universal master that had some dominant role in society—most clearly in the position of Emperor—was replaced with a swarm of figures wanting to take the role of master, as was also seen in the United States. The absence of a symbolic father作者: Lipoprotein 時(shí)間: 2025-4-1 04:05 作者: FOLD 時(shí)間: 2025-4-1 08:50
Chin-Chen Chang,Yung-Chen Chou,Tzu-Chuen Lurus as an external threat. The loss of a place of a single, universal master that had some dominant role in society—most clearly in the position of Emperor—was replaced with a swarm of figures wanting to take the role of master, as was also seen in the United States. The absence of a symbolic father作者: lavish 時(shí)間: 2025-4-1 13:18
Rui Xue,Dengguo Fengis unusual and its success has been remarkable. It was created by the nonprofit Hepatitis BFoundation and its research arm, the Baruch S. Blumberg Institute, to help their effort to find a cure for hepatitis B. But it has proved to be more than a source of funding for those nonprofits – it has becom作者: Fester 時(shí)間: 2025-4-1 16:33 作者: Bouquet 時(shí)間: 2025-4-1 21:49