標(biāo)題: Titlebook: Information and Communications Security; Third International Sihan Qing,Tatsuaki Okamoto,Jianying Zhou Conference proceedings 2001 Springe [打印本頁] 作者: 方面 時間: 2025-3-21 19:30
書目名稱Information and Communications Security影響因子(影響力)
書目名稱Information and Communications Security影響因子(影響力)學(xué)科排名
書目名稱Information and Communications Security網(wǎng)絡(luò)公開度
書目名稱Information and Communications Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information and Communications Security被引頻次
書目名稱Information and Communications Security被引頻次學(xué)科排名
書目名稱Information and Communications Security年度引用
書目名稱Information and Communications Security年度引用學(xué)科排名
書目名稱Information and Communications Security讀者反饋
書目名稱Information and Communications Security讀者反饋學(xué)科排名
作者: vanquish 時間: 2025-3-21 20:42 作者: ETCH 時間: 2025-3-22 04:26
Kishan Chand Gupta,Subhamoy Maitrahanes which were not yet available via other routes, e.g. .-[2.2]metacyclophane, and phanes, which contain .-aromatic π-decks and are only stable when complexed with the metal. Removing the stabilizing metal unit lead to valence isomerism, which gave interesting hydrocarbons, e.g. propella[3.]prisma作者: instructive 時間: 2025-3-22 07:32
,Towards the Forgery of a Group Signature without Knowing the Group Center’s Secret,lled “convertible group signature”. Recently, Saeednia pointed out that there are weaknesses in a convertible group signature scheme proposed by Kim et al. Furthermore, Saeednia proposed a modified scheme to eliminate these weaknesses. In this paper, we show that there is a way to forge a group signature even if adopting Saeednia’s modified scheme.作者: Irascible 時間: 2025-3-22 12:15 作者: Aboveboard 時間: 2025-3-22 13:27
Kazumaro Aoki,Fumitaka Hoshino,Tetsutaro Kobayashi作者: 諂媚于性 時間: 2025-3-22 17:24
Hee-Wan Kim,Hae-Kyung Rhee,Tai M. Chung,Young Ik Eom,Ung-Mo Kim作者: Cougar 時間: 2025-3-22 23:06 作者: AMEND 時間: 2025-3-23 02:19 作者: 發(fā)展 時間: 2025-3-23 06:31
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465896.jpg作者: Banister 時間: 2025-3-23 12:18
978-3-540-42880-0Springer-Verlag Berlin Heidelberg 2001作者: Hippocampus 時間: 2025-3-23 16:01
Information and Communications Security978-3-540-45600-1Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 顧客 時間: 2025-3-23 20:20
An Intelligent Intruder Model for Security Protocol Analysis,cide when to generate what terms and whether or not to launch a new session, which principal to choose, and what roles the principal will play based on some strand-added rules. By this heuristic method, we can get a finite state space without the explicit configuration needed by most model checking tools.作者: libertine 時間: 2025-3-24 00:10
https://doi.org/10.1007/3-540-45600-7Authentication; Boolean function; Code; Computational Algebra; Cryptographic Algorithms; Data Security; Di作者: 色情 時間: 2025-3-24 05:17
Unconditionally-Secure Oblivious Transfer,This paper investigates oblivious transfer protocol based on privacy amplification that uses R.nyi entropy of order . for any 1. 2, the conditions under which the protocol is secure are given. In protocol it makes no assumptions about receiver’s computing power, so under the given conditions the protocol is unconditionally-secure.作者: 胡言亂語 時間: 2025-3-24 07:34
Performance of WTLS and Its Impact on an M-commerce Transaction,Transaction security is commonly seen as one of the key factors influencing the success of .. In this paper simulation- based performance measurements of the . protocol are presented. Its impact on an exemplary m-commerce transaction is discussed.作者: decode 時間: 2025-3-24 11:40
Security of Blind Discrete Log Signatures against Interactive Attacks,l times with a legitimate signer and produces from these interactions l + 1 signatures. Security against the new attack requires that the following ROS-problem is intractable: find an .verdetermined,. olvable system of linear equations modulo q with.andom inhomogenities (right sides)..There is an in作者: 極大痛苦 時間: 2025-3-24 16:47
An Intelligent Intruder Model for Security Protocol Analysis,cide when to generate what terms and whether or not to launch a new session, which principal to choose, and what roles the principal will play based on some strand-added rules. By this heuristic method, we can get a finite state space without the explicit configuration needed by most model checking 作者: 蹣跚 時間: 2025-3-24 20:24 作者: Affable 時間: 2025-3-25 01:06 作者: 誘惑 時間: 2025-3-25 03:35 作者: extemporaneous 時間: 2025-3-25 09:54
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain,rs to embed watermarks in images for various applications, evaluation of watermarking algorithms becomes more and more important. The degradation of watermarked images, which can be measured by signal to noise ratio (SNR) or peak signal to noise ratio (PSNR), is one of the major performance indexes 作者: 發(fā)起 時間: 2025-3-25 14:39 作者: 點燃 時間: 2025-3-25 16:57
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves, years. The problem of how to decrease the amount of addition and scalar multiplication on the Jacobians of hyperelliptic curves so that the implementation speed can be improved is very important for the practical use of HCC. In this paper, Using Frobenius endomorphism as a tool, we discuss the prob作者: 不知疲倦 時間: 2025-3-25 21:10 作者: 容易做 時間: 2025-3-26 00:22 作者: insurrection 時間: 2025-3-26 04:20
A New Approach for Secure Multicast Routing in a Large Scale Network,henticated and receive/use proper capabilities when they join a multicast group so that illegal hosts or routers may not be able to expand the multicast delivery tree. Messages are encrypted with either a group data key or sender specific key that is shared by all members and changed efficiently whe作者: 成績上升 時間: 2025-3-26 12:06
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database ncy for multilevel secure database. This protocol expended the twoway donation locking protocol in multilevel secure database, and eliminated unauthorized information flows. Altruistic locking has attempted to reduce delay effect associated with lock release moment by use of the idea of donation. An作者: Cpap155 時間: 2025-3-26 12:48
Dealing with Uncertainties in Risk Analysis Using Belief Functions,that its result provides a decision-basis for safeguard implementation. However, it must often rely on speculation, educated guesses, incomplete data, and many unproven assumptions. Users of risk analysis often provide their uncertain subjective opinions as input values to risk analysis. Therefore, 作者: nuclear-tests 時間: 2025-3-26 19:05
RBAC for XML Document Stores,erged as an important standard in the area of information representation. XML documents can represent information at different levels of sensitivity. Access control for XML document stores must recognise the finegrained nature of the document structure. In this paper we present an approach to access作者: white-matter 時間: 2025-3-26 23:06 作者: Volatile-Oils 時間: 2025-3-27 01:31
Encryption Sticks (Randomats), supply of random bits, ready for safe and versatile use by individuals and organizations. Usage ranges from a steady supply of random keys to the prevailing symmetric and stream cryptographies, and up to raw one-time-pad protocols. The contraption dubbed encryption stick, e-stick, or Randomat enabl作者: 放牧 時間: 2025-3-27 06:02
Applying NCP Logic to the Analysis of SSL 3.0,sured of the freshness and the origin of the pre-master secret when RSA is used for key exchange. We only give specification and analysis of one authentication mode of SSL 3.0 in detail, but all authentication modes have the two weak points. Especially, the flaw of the freshness of the pre-master se作者: Ccu106 時間: 2025-3-27 11:49
Dongxi Liu,Xiaoyong Li,Yingcai Baiexed phanes turned out to be valuable subjects for NMR-examinations in order to draw a map of the magnetic environment of sandwich complexes, e.g. di(benzene)chromium and ferrocene, and they provided an insight into the effect of ring current disrupture, due to metal complexation. First attempts wer作者: 施舍 時間: 2025-3-27 14:56 作者: 減去 時間: 2025-3-27 21:10 作者: Synchronism 時間: 2025-3-28 00:52 作者: Vulvodynia 時間: 2025-3-28 05:16
Dealing with Uncertainties in Risk Analysis Using Belief Functions,the consideration of uncertainties in input data should be made when performing a risk analysis. As a tool for expressing and dealing with uncertainties in input data, we suggest the use of belief functions. Weprovide examples of how to use belief functions in qualitative risk analysis methods.作者: 斗志 時間: 2025-3-28 09:44
Conference proceedings 2001eceding conferences, ICICS’97 was held in Beijing, China, 11-14 November 1997 and ICICS’99 in Sydney, Australia, 9-11 November 1999. The ICICS’97 and ICICS’99 proceedings were released as volumes 1334 and 1726 of Springer- Verlag’s Lecture Notes in Computer Science series. ICICS 2001 was sponsored b作者: 有助于 時間: 2025-3-28 12:36 作者: 馬籠頭 時間: 2025-3-28 17:28
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain, the scaling parameter in a typical watermarking algorithm and the degradation of watermarked images. Experimental results show that the estimation error of SNR and PSNR is less than 1 dB. Using this relationship, we design an adaptive insertion strategy that can be employed to embed watermarks in natural images with assigned SNR or PSNR.作者: 分開如此和諧 時間: 2025-3-28 20:07 作者: Invertebrate 時間: 2025-3-29 02:03
Encryption Sticks (Randomats),ns, and wholesale transparency of issues, with potentially broad social implications. The e-stick will be cash purchased in a public shop (anonymity), and this off-Internet item will protect its user from the pervasive data nakedness in cyberspace.作者: 使糾纏 時間: 2025-3-29 06:58
Cryptanalysis of the Improved User Efficient Blind Signatures,o pointed out that this scheme did not achieve the unlinkability property. Furthermore, he also proposed an improved blind signature scheme to remedy this weakness and reduce the computations for requests. In this article, we presents a linking strategy to show that this improved version is also not a true blind signature scheme.作者: Juvenile 時間: 2025-3-29 09:58
A Cyclic Window Algorithm for ECC Defined over Extension Fields,lications for a practically used curve in comparison with Lim-Hwang‘s results presented at PKC2000, the fastest previously reported. The algorithm was implemented on computers. As a result, scalar multiplication can be accomplished in 573μs, 595μs, and 254μs on Pentium II (450 MHz), 21164A (500 MHz), and 21264 (500 MHz) computers, respectively.作者: BINGE 時間: 2025-3-29 11:56
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce, introduce derivatives regarding the uncertain values. This paper shows a theoretical pricing equation of the derivatives when the underlying digital objects have systematic default or revocation risks. We can make use of this pricing to estimate the risks.作者: 不規(guī)則的跳動 時間: 2025-3-29 15:42
RBAC for XML Document Stores,Access control for XML document stores must recognise the finegrained nature of the document structure. In this paper we present an approach to access control for XML document stores. This framework is based on RBAC and includes a syntax for specifying access control policies for the store.作者: 圣人 時間: 2025-3-29 23:07 作者: CLAIM 時間: 2025-3-30 02:54
Applying NCP Logic to the Analysis of SSL 3.0,ntication mode of SSL 3.0 in detail, but all authentication modes have the two weak points. Especially, the flaw of the freshness of the pre-master secret may result in reuse of the pre-master secret, and we properly remedy it by introducing a nonce.作者: 建筑師 時間: 2025-3-30 06:43
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database ature for multilevel secure database. Our protocol ensures serializability, eliminates covert channels to have preference to a lower level transaction, and reduces the starvation of short-lived transaction. The efficiency of the proposed protocol was verified by experimental results.作者: syring 時間: 2025-3-30 11:42 作者: 星星 時間: 2025-3-30 13:22
Reasoning about Exceptions to Contractson enjoys interesting properties regarding the ABA semantics of results obtained and the determinism of diagnostic answers. As a case study, we present the workings of the framework on a delivery process from e-commerce.作者: lavish 時間: 2025-3-30 17:05 作者: Common-Migraine 時間: 2025-3-30 23:17 作者: Eulogy 時間: 2025-3-31 01:39 作者: Cpr951 時間: 2025-3-31 08:26 作者: FLUSH 時間: 2025-3-31 10:00
From allegation to formal accusationat Salt Lake historical water levels and predict its future rise and fall with much better accuracy. Therefore, we can observe that fractional-order signal processing techniques provide more powerful tools for forecasting the Great Salt Lake elevation time series with long-range dependent and infinite variance properties.作者: Brochure 時間: 2025-3-31 16:24 作者: 規(guī)章 時間: 2025-3-31 18:58
Argumentationstheorie nach Perelmanent. Approximately, eight hundred eighty tonnes of waste is dumped at Bandhwari plant. Their role is to gather loss from every street; afterward, compaction of trash happens as smaller than usual exchange center, while the compressed waste is moved to handling office, and the last dry waste would be作者: 燈絲 時間: 2025-4-1 00:33
Manmohan Dogra,Jayashree Domala,Jenny Dcruz,Safa Hamdaresport layer. We experimented with a dataset consisting of 4 lakh records of synthetic data, out of which we used 70% of the dataset for training purpose and performance measure on the rest 30% of the dataset. Our experimental results show that 97.7% of DDoS attacks were successfully identified and t作者: 狗窩 時間: 2025-4-1 04:07
,The White Man’s Burden of Educating Natives for Self-Government and the Counter-Claim about the Demtradition. Interpretations of India’s Buddhist heritage as democratic tradition permitted to refute British claims about the White Man’s Burden and White Man’s Mission to impose tutelage on native peoples until they should have advanced far enough in their “education” to “l(fā)earn the responsibilities”作者: Decline 時間: 2025-4-1 06:10 作者: mitral-valve 時間: 2025-4-1 13:21 作者: 合群 時間: 2025-4-1 18:10
Book 2013ugen des Bewerbers zu sehen. Wie man dies – von der Ansprache, dem Aufbau der Anzeige, der Tonalit?t, der Textstrategie bis zum Satzbau und zur Wortwahl – in der Stellenanzeige umsetzt, erfahren Sie in diesem Buch. ?作者: PAN 時間: 2025-4-1 22:19
Book 1976t of the conference they could not be considered in any depth. This will be rectified in Vancouver; and already the study of human settlements and their problems is the focus of an intensive progrannne of activities throughout the world in preparation for the HABITAT meeting. The HABITAT conference