派博傳思國際中心

標(biāo)題: Titlebook: Information and Communications Security; 5th International Co Sihan Qing,Dieter Gollmann,Jianying Zhou Conference proceedings 2003 Springer [打印本頁]

作者: HARDY    時(shí)間: 2025-3-21 19:12
書目名稱Information and Communications Security影響因子(影響力)




書目名稱Information and Communications Security影響因子(影響力)學(xué)科排名




書目名稱Information and Communications Security網(wǎng)絡(luò)公開度




書目名稱Information and Communications Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Information and Communications Security被引頻次




書目名稱Information and Communications Security被引頻次學(xué)科排名




書目名稱Information and Communications Security年度引用




書目名稱Information and Communications Security年度引用學(xué)科排名




書目名稱Information and Communications Security讀者反饋




書目名稱Information and Communications Security讀者反饋學(xué)科排名





作者: Ambulatory    時(shí)間: 2025-3-22 00:11

作者: 形容詞    時(shí)間: 2025-3-22 01:17
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST,ppropriately denoted by . .?+?...?+?. .=., which represents the summation of . evaluations of a polynomial. We also show how to extend the generic RST scheme [6] to a .-out-. threshold ring signature scheme.
作者: 水槽    時(shí)間: 2025-3-22 04:51
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents,mple but efficient with a dispatch complexity of .(. . .). The secure route structures adopt the combination of public-key encryption and signature schemes and expose minimal route information to hosts. The nested structure can help to detect attacks as early as possible.
作者: 內(nèi)閣    時(shí)間: 2025-3-22 09:27

作者: 抱負(fù)    時(shí)間: 2025-3-22 16:04

作者: 急性    時(shí)間: 2025-3-22 19:38
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption,y Pointcheval and Stern [4], we can show the equivalence between the existence of a forger with the solvability of the strong RSA problem. Further we show that our scheme introduces no significant communication overhead comparing with the original OGQ scheme.
作者: SNEER    時(shí)間: 2025-3-22 21:22

作者: exquisite    時(shí)間: 2025-3-23 04:51

作者: maroon    時(shí)間: 2025-3-23 07:11
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback,ssage. Analytical and simulation studies have been performed to evaluate the performance improvements. We demonstrated that our enhanced solution provides faster construction of the attack graph, with only marginal increase in computation, storage and bandwidth.
作者: 健忘癥    時(shí)間: 2025-3-23 10:00

作者: 蛤肉    時(shí)間: 2025-3-23 15:50

作者: 改良    時(shí)間: 2025-3-23 18:24
A Lattice Based General Blind Watermark Scheme, is proposed. The host data interference is eliminated entirely and only a little of cost of storage is needed. Thus, it has considerable advantage over previously proposed schemes. Experimental results demonstrated the power of this scheme.
作者: Juvenile    時(shí)間: 2025-3-24 01:52
Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains,t the receiver, the multiple description decoder combines the information of each description to reconstruct the original signature image. We experiment the proposed scheme for embedding gray-scale signature images of 128×128 pixels in the gray-scale host image of 512×512 pixels, and evaluate the system robustness to various attacks.
作者: 即席演說    時(shí)間: 2025-3-24 02:39
Protocols for Malicious Host Revocation,revoked. Each agent sender consults the HoRA before sending an agent in order to remove from the agent’s itinerary all the malicious hosts. Accordingly, the revoked hosts will not receive mobile agents any more. This paper presents two new protocols that can be used to revoke malicious hosts.
作者: maladorit    時(shí)間: 2025-3-24 09:20

作者: 陳腐思想    時(shí)間: 2025-3-24 13:58
978-3-540-20150-2Springer-Verlag Berlin Heidelberg 2003
作者: nascent    時(shí)間: 2025-3-24 16:08
Information and Communications Security978-3-540-39927-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: enflame    時(shí)間: 2025-3-24 20:40
https://doi.org/10.1007/b13930TCP/IP; communication; cryptography; finite field; information; security; verification; algorithm analysis
作者: 宣誓書    時(shí)間: 2025-3-24 23:30

作者: 讓步    時(shí)間: 2025-3-25 06:08

作者: 貪心    時(shí)間: 2025-3-25 08:04

作者: Nausea    時(shí)間: 2025-3-25 14:17

作者: Modify    時(shí)間: 2025-3-25 16:21

作者: 600    時(shí)間: 2025-3-25 20:32

作者: Substitution    時(shí)間: 2025-3-26 03:32

作者: 剝削    時(shí)間: 2025-3-26 06:00

作者: 泰然自若    時(shí)間: 2025-3-26 12:07

作者: 即席    時(shí)間: 2025-3-26 12:47

作者: BUCK    時(shí)間: 2025-3-26 18:35

作者: COWER    時(shí)間: 2025-3-26 22:35
Yan Wang,Chi-Hung Chi,Tieyan Liy shadow of doubt that Tropical Cyclone Idai was incomparable in terms of the damage and the manner in which the event took Zimbabwe many years back in development. To this end, the attainment of the 2030 Agenda for Sustainable Development by Zimbabwe became more remote. It was indeed, a catastrophi
作者: 細(xì)菌等    時(shí)間: 2025-3-27 04:55
Duncan S. Wong,Karyin Fung,Joseph K. Liu,Victor K. Weimanimani Mountains, Nyabamba, Tarka Forest, Chimanimani National Park and Blocky. Water pollution, dying aquatic life, damaged cultural and traditional sites, as well as extensive deforestation also emerged. Illegal gold mining and its associated activities were a real threat to the tourism industry
作者: 枕墊    時(shí)間: 2025-3-27 06:13
Ricardo Nabhen,Edgard Jamhour,Carlos Mazieroribution of expired foodstuffs, the politicisation of aid, the exclusion of those whom authorities thought had adequate resources and multiple claims for food parcels by victims, food rotting in warehouses, gender-based violence resulting from cash payments, aid shrinkage by officials and aid-relate
作者: 辮子帶來幫助    時(shí)間: 2025-3-27 10:00

作者: EWER    時(shí)間: 2025-3-27 14:02
Guilin Wang,Feng Bao,Jianying Zhou,Robert H. Denge measures to improve all the EWS components. The private sector is an underutilised actor in the EWS, and we recommend that, rather than engaging the private sector in the post-disaster response, the private sector needs to be incorporated in pre-disaster EWS activities. A people-centred, impact-ba
作者: MAIZE    時(shí)間: 2025-3-27 18:43

作者: AVERT    時(shí)間: 2025-3-27 22:49
Jianying Zhou,Feng Bao,Robert Denginfall at large spatial and temporal scales, such as floods from rainfall in upstream catchment. Therefore, IK indicators may not provide sufficient foreknowledge to respond to climate events such as cyclones. Scientific climate knowledge may provide forecasts at both small and large spatial and tem
作者: 運(yùn)動(dòng)吧    時(shí)間: 2025-3-28 06:03

作者: venous-leak    時(shí)間: 2025-3-28 09:26

作者: Host142    時(shí)間: 2025-3-28 10:31

作者: 正常    時(shí)間: 2025-3-28 15:38
Yongliang Liu,Wen Gao,Zhao Wang,Shaohui Liurategies and opinions towards recovering. The research was framed as a qualitative study, which depended on interviews, reviews of online news articles, social media postings, United Nations reports and observations. The chapter relies on qualitative content analysis and documentary reviews to analy
作者: figurine    時(shí)間: 2025-3-28 19:27
Gregory Saunders,Michael Hitchens,Vijay Varadharajanrategies and opinions towards recovering. The research was framed as a qualitative study, which depended on interviews, reviews of online news articles, social media postings, United Nations reports and observations. The chapter relies on qualitative content analysis and documentary reviews to analy
作者: GEN    時(shí)間: 2025-3-29 00:18

作者: Statins    時(shí)間: 2025-3-29 04:30
Gang Li,Jie Yang in Zimbabwe to understand the current state of knowledge. Furthermore, economic and social dimensions of sustainable development are interrogated whilst applying children’s best interests’ lens. Additionally, in the face of natural disasters the chapter catalogues different child protection priorit
作者: 不可思議    時(shí)間: 2025-3-29 08:03
Mohsen Ashourian,Yo-Sung Ho in Zimbabwe to understand the current state of knowledge. Furthermore, economic and social dimensions of sustainable development are interrogated whilst applying children’s best interests’ lens. Additionally, in the face of natural disasters the chapter catalogues different child protection priorit
作者: Narcissist    時(shí)間: 2025-3-29 12:00

作者: 幼稚    時(shí)間: 2025-3-29 19:09

作者: 討厭    時(shí)間: 2025-3-29 23:42
A Fast Square Root Computation Using the Frobenius Mapping,an extension field are reduced to that over a proper subfield by the norm computation. In addition a inverse square root algorithm and an addition chain are adopted to save the computation cost. All of the above-mentioned steps have been proven to make the proposed algorithm much faster than the con
作者: 表否定    時(shí)間: 2025-3-30 00:25

作者: Encephalitis    時(shí)間: 2025-3-30 04:25
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents,large-scale sharing of data and computing resources, security and efficiency are of great concern. In this paper, we present secure route structures and corresponding protocols for mobile agents dispatched in binary to protect the dispatch route information of agents. The binary dispatch model is si
作者: thyroid-hormone    時(shí)間: 2025-3-30 11:01
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST,n the erasure correction technique of the RS code and the polynomial interpolation. The structure is very simple and yields a ring equation that can appropriately denoted by . .?+?...?+?. .=., which represents the summation of . evaluations of a polynomial. We also show how to extend the generic RST
作者: 強(qiáng)制性    時(shí)間: 2025-3-30 16:25

作者: FEAS    時(shí)間: 2025-3-30 18:44

作者: CLAM    時(shí)間: 2025-3-30 23:26
Security Remarks on a Group Signature Scheme with Member Deletion,e of a dispute, however, a designated group manager can reveal the signer of a valid group signature. Based on the Camenisch-Michels group signature scheme [7,8], Kim, Lim and Lee proposed the first group signature scheme with a member deletion procedure at ICISC 2000 [15]. Their scheme is very effi
作者: GRIEF    時(shí)間: 2025-3-31 02:28

作者: aspersion    時(shí)間: 2025-3-31 05:08
An Efficient Public-Key Framework,e might be revoked before its scheduled expiry date by the issuing CA. Efficient and timely distribution of certificate revocation information is a big challenge facing the PKI providers. Existing certificate revocation schemes place a considerable processing, communication, and storage overheads on
作者: Debate    時(shí)間: 2025-3-31 11:18

作者: 大量殺死    時(shí)間: 2025-3-31 14:44
Practical Service Charge for P2P Content Distribution,scenario, one peer can be playing different roles, either as a distributor or as a receiver of digital contents. In order to incentivize the legal distribution of these contents and prevent the network from free riders, we propose a charging model where distributors become merchants and receivers be
作者: 領(lǐng)帶    時(shí)間: 2025-3-31 18:42
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback, real location. The current Internet protocols and infrastructure do not provide intrinsic support to traceback the real attack sources. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the attack packets. Different traceback methods have been
作者: BURSA    時(shí)間: 2025-4-1 00:13
A Lattice Based General Blind Watermark Scheme,ark applications, it is often desired to retrieve the embedded information without access to the host data; this is known as blind watermark. Most of previous blind watermark schemes either suffer significantly from host data interference or require expense of storage. Therefore, simple and effectiv
作者: Glycogen    時(shí)間: 2025-4-1 02:00

作者: Uncultured    時(shí)間: 2025-4-1 06:25
Broadcast Encryption Schemes Based on the Sectioned Key Tree,asic strategy of the proposed approach could be formulated as follows: Before dealing with the set covering issues, perform an appropriate preprocessing over the underlying tree in order to specify a more suitable underlying structure for the set covering. The main underlying idea for developing a n
作者: 發(fā)起    時(shí)間: 2025-4-1 12:37
Research on the Collusion Estimation,arking technique must be robust against malicious attacks, while the knowledge on attacks is limited. Here we propose a formulation of collusion attack using an estimation-based concept. The algorithm aim for the high probability watermark estimation, which is also can be used to the hiding informat




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
舒兰市| 平罗县| 江都市| 大英县| 古丈县| 铁岭县| 义乌市| 邵阳市| 纳雍县| 黄冈市| 岢岚县| 师宗县| 台前县| 大厂| 周口市| 平凉市| 文成县| 兰州市| 宿松县| 金川县| 高邮市| 恩施市| 康马县| 怀仁县| 漳州市| 保康县| 贵阳市| 隆化县| 长兴县| 浦江县| 谷城县| 竹溪县| 利川市| 秭归县| 诸城市| 神农架林区| 贡觉县| 通州区| 阿拉善盟| 湖南省| 莱芜市|