標(biāo)題: Titlebook: Information and Communications Security; 5th International Co Sihan Qing,Dieter Gollmann,Jianying Zhou Conference proceedings 2003 Springer [打印本頁] 作者: HARDY 時(shí)間: 2025-3-21 19:12
書目名稱Information and Communications Security影響因子(影響力)
書目名稱Information and Communications Security影響因子(影響力)學(xué)科排名
書目名稱Information and Communications Security網(wǎng)絡(luò)公開度
書目名稱Information and Communications Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information and Communications Security被引頻次
書目名稱Information and Communications Security被引頻次學(xué)科排名
書目名稱Information and Communications Security年度引用
書目名稱Information and Communications Security年度引用學(xué)科排名
書目名稱Information and Communications Security讀者反饋
書目名稱Information and Communications Security讀者反饋學(xué)科排名
作者: Ambulatory 時(shí)間: 2025-3-22 00:11 作者: 形容詞 時(shí)間: 2025-3-22 01:17
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST,ppropriately denoted by . .?+?...?+?. .=., which represents the summation of . evaluations of a polynomial. We also show how to extend the generic RST scheme [6] to a .-out-. threshold ring signature scheme.作者: 水槽 時(shí)間: 2025-3-22 04:51
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents,mple but efficient with a dispatch complexity of .(. . .). The secure route structures adopt the combination of public-key encryption and signature schemes and expose minimal route information to hosts. The nested structure can help to detect attacks as early as possible.作者: 內(nèi)閣 時(shí)間: 2025-3-22 09:27 作者: 抱負(fù) 時(shí)間: 2025-3-22 16:04 作者: 急性 時(shí)間: 2025-3-22 19:38
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption,y Pointcheval and Stern [4], we can show the equivalence between the existence of a forger with the solvability of the strong RSA problem. Further we show that our scheme introduces no significant communication overhead comparing with the original OGQ scheme.作者: SNEER 時(shí)間: 2025-3-22 21:22 作者: exquisite 時(shí)間: 2025-3-23 04:51 作者: maroon 時(shí)間: 2025-3-23 07:11
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback,ssage. Analytical and simulation studies have been performed to evaluate the performance improvements. We demonstrated that our enhanced solution provides faster construction of the attack graph, with only marginal increase in computation, storage and bandwidth.作者: 健忘癥 時(shí)間: 2025-3-23 10:00 作者: 蛤肉 時(shí)間: 2025-3-23 15:50 作者: 改良 時(shí)間: 2025-3-23 18:24
A Lattice Based General Blind Watermark Scheme, is proposed. The host data interference is eliminated entirely and only a little of cost of storage is needed. Thus, it has considerable advantage over previously proposed schemes. Experimental results demonstrated the power of this scheme.作者: Juvenile 時(shí)間: 2025-3-24 01:52
Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains,t the receiver, the multiple description decoder combines the information of each description to reconstruct the original signature image. We experiment the proposed scheme for embedding gray-scale signature images of 128×128 pixels in the gray-scale host image of 512×512 pixels, and evaluate the system robustness to various attacks.作者: 即席演說 時(shí)間: 2025-3-24 02:39
Protocols for Malicious Host Revocation,revoked. Each agent sender consults the HoRA before sending an agent in order to remove from the agent’s itinerary all the malicious hosts. Accordingly, the revoked hosts will not receive mobile agents any more. This paper presents two new protocols that can be used to revoke malicious hosts.作者: maladorit 時(shí)間: 2025-3-24 09:20 作者: 陳腐思想 時(shí)間: 2025-3-24 13:58
978-3-540-20150-2Springer-Verlag Berlin Heidelberg 2003作者: nascent 時(shí)間: 2025-3-24 16:08
Information and Communications Security978-3-540-39927-8Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: enflame 時(shí)間: 2025-3-24 20:40
https://doi.org/10.1007/b13930TCP/IP; communication; cryptography; finite field; information; security; verification; algorithm analysis 作者: 宣誓書 時(shí)間: 2025-3-24 23:30 作者: 讓步 時(shí)間: 2025-3-25 06:08 作者: 貪心 時(shí)間: 2025-3-25 08:04 作者: Nausea 時(shí)間: 2025-3-25 14:17 作者: Modify 時(shí)間: 2025-3-25 16:21 作者: 600 時(shí)間: 2025-3-25 20:32 作者: Substitution 時(shí)間: 2025-3-26 03:32 作者: 剝削 時(shí)間: 2025-3-26 06:00 作者: 泰然自若 時(shí)間: 2025-3-26 12:07 作者: 即席 時(shí)間: 2025-3-26 12:47 作者: BUCK 時(shí)間: 2025-3-26 18:35 作者: COWER 時(shí)間: 2025-3-26 22:35
Yan Wang,Chi-Hung Chi,Tieyan Liy shadow of doubt that Tropical Cyclone Idai was incomparable in terms of the damage and the manner in which the event took Zimbabwe many years back in development. To this end, the attainment of the 2030 Agenda for Sustainable Development by Zimbabwe became more remote. It was indeed, a catastrophi作者: 細(xì)菌等 時(shí)間: 2025-3-27 04:55
Duncan S. Wong,Karyin Fung,Joseph K. Liu,Victor K. Weimanimani Mountains, Nyabamba, Tarka Forest, Chimanimani National Park and Blocky. Water pollution, dying aquatic life, damaged cultural and traditional sites, as well as extensive deforestation also emerged. Illegal gold mining and its associated activities were a real threat to the tourism industry作者: 枕墊 時(shí)間: 2025-3-27 06:13
Ricardo Nabhen,Edgard Jamhour,Carlos Mazieroribution of expired foodstuffs, the politicisation of aid, the exclusion of those whom authorities thought had adequate resources and multiple claims for food parcels by victims, food rotting in warehouses, gender-based violence resulting from cash payments, aid shrinkage by officials and aid-relate作者: 辮子帶來幫助 時(shí)間: 2025-3-27 10:00 作者: EWER 時(shí)間: 2025-3-27 14:02
Guilin Wang,Feng Bao,Jianying Zhou,Robert H. Denge measures to improve all the EWS components. The private sector is an underutilised actor in the EWS, and we recommend that, rather than engaging the private sector in the post-disaster response, the private sector needs to be incorporated in pre-disaster EWS activities. A people-centred, impact-ba作者: MAIZE 時(shí)間: 2025-3-27 18:43 作者: AVERT 時(shí)間: 2025-3-27 22:49
Jianying Zhou,Feng Bao,Robert Denginfall at large spatial and temporal scales, such as floods from rainfall in upstream catchment. Therefore, IK indicators may not provide sufficient foreknowledge to respond to climate events such as cyclones. Scientific climate knowledge may provide forecasts at both small and large spatial and tem作者: 運(yùn)動(dòng)吧 時(shí)間: 2025-3-28 06:03 作者: venous-leak 時(shí)間: 2025-3-28 09:26 作者: Host142 時(shí)間: 2025-3-28 10:31 作者: 正常 時(shí)間: 2025-3-28 15:38
Yongliang Liu,Wen Gao,Zhao Wang,Shaohui Liurategies and opinions towards recovering. The research was framed as a qualitative study, which depended on interviews, reviews of online news articles, social media postings, United Nations reports and observations. The chapter relies on qualitative content analysis and documentary reviews to analy作者: figurine 時(shí)間: 2025-3-28 19:27
Gregory Saunders,Michael Hitchens,Vijay Varadharajanrategies and opinions towards recovering. The research was framed as a qualitative study, which depended on interviews, reviews of online news articles, social media postings, United Nations reports and observations. The chapter relies on qualitative content analysis and documentary reviews to analy作者: GEN 時(shí)間: 2025-3-29 00:18 作者: Statins 時(shí)間: 2025-3-29 04:30
Gang Li,Jie Yang in Zimbabwe to understand the current state of knowledge. Furthermore, economic and social dimensions of sustainable development are interrogated whilst applying children’s best interests’ lens. Additionally, in the face of natural disasters the chapter catalogues different child protection priorit作者: 不可思議 時(shí)間: 2025-3-29 08:03
Mohsen Ashourian,Yo-Sung Ho in Zimbabwe to understand the current state of knowledge. Furthermore, economic and social dimensions of sustainable development are interrogated whilst applying children’s best interests’ lens. Additionally, in the face of natural disasters the chapter catalogues different child protection priorit作者: Narcissist 時(shí)間: 2025-3-29 12:00 作者: 幼稚 時(shí)間: 2025-3-29 19:09 作者: 討厭 時(shí)間: 2025-3-29 23:42
A Fast Square Root Computation Using the Frobenius Mapping,an extension field are reduced to that over a proper subfield by the norm computation. In addition a inverse square root algorithm and an addition chain are adopted to save the computation cost. All of the above-mentioned steps have been proven to make the proposed algorithm much faster than the con作者: 表否定 時(shí)間: 2025-3-30 00:25 作者: Encephalitis 時(shí)間: 2025-3-30 04:25
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents,large-scale sharing of data and computing resources, security and efficiency are of great concern. In this paper, we present secure route structures and corresponding protocols for mobile agents dispatched in binary to protect the dispatch route information of agents. The binary dispatch model is si作者: thyroid-hormone 時(shí)間: 2025-3-30 11:01
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST,n the erasure correction technique of the RS code and the polynomial interpolation. The structure is very simple and yields a ring equation that can appropriately denoted by . .?+?...?+?. .=., which represents the summation of . evaluations of a polynomial. We also show how to extend the generic RST作者: 強(qiáng)制性 時(shí)間: 2025-3-30 16:25 作者: FEAS 時(shí)間: 2025-3-30 18:44 作者: CLAM 時(shí)間: 2025-3-30 23:26
Security Remarks on a Group Signature Scheme with Member Deletion,e of a dispute, however, a designated group manager can reveal the signer of a valid group signature. Based on the Camenisch-Michels group signature scheme [7,8], Kim, Lim and Lee proposed the first group signature scheme with a member deletion procedure at ICISC 2000 [15]. Their scheme is very effi作者: GRIEF 時(shí)間: 2025-3-31 02:28 作者: aspersion 時(shí)間: 2025-3-31 05:08
An Efficient Public-Key Framework,e might be revoked before its scheduled expiry date by the issuing CA. Efficient and timely distribution of certificate revocation information is a big challenge facing the PKI providers. Existing certificate revocation schemes place a considerable processing, communication, and storage overheads on作者: Debate 時(shí)間: 2025-3-31 11:18 作者: 大量殺死 時(shí)間: 2025-3-31 14:44
Practical Service Charge for P2P Content Distribution,scenario, one peer can be playing different roles, either as a distributor or as a receiver of digital contents. In order to incentivize the legal distribution of these contents and prevent the network from free riders, we propose a charging model where distributors become merchants and receivers be作者: 領(lǐng)帶 時(shí)間: 2025-3-31 18:42
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback, real location. The current Internet protocols and infrastructure do not provide intrinsic support to traceback the real attack sources. The objective of IP Traceback is to determine the real attack sources, as well as the full path taken by the attack packets. Different traceback methods have been 作者: BURSA 時(shí)間: 2025-4-1 00:13
A Lattice Based General Blind Watermark Scheme,ark applications, it is often desired to retrieve the embedded information without access to the host data; this is known as blind watermark. Most of previous blind watermark schemes either suffer significantly from host data interference or require expense of storage. Therefore, simple and effectiv作者: Glycogen 時(shí)間: 2025-4-1 02:00 作者: Uncultured 時(shí)間: 2025-4-1 06:25
Broadcast Encryption Schemes Based on the Sectioned Key Tree,asic strategy of the proposed approach could be formulated as follows: Before dealing with the set covering issues, perform an appropriate preprocessing over the underlying tree in order to specify a more suitable underlying structure for the set covering. The main underlying idea for developing a n作者: 發(fā)起 時(shí)間: 2025-4-1 12:37
Research on the Collusion Estimation,arking technique must be robust against malicious attacks, while the knowledge on attacks is limited. Here we propose a formulation of collusion attack using an estimation-based concept. The algorithm aim for the high probability watermark estimation, which is also can be used to the hiding informat