派博傳思國際中心

標(biāo)題: Titlebook: Information and Communications Security; Third International Sihan Qing,Tatsuaki Okamoto,Jianying Zhou Conference proceedings 2001 Springe [打印本頁]

作者: 方面    時間: 2025-3-21 19:30
書目名稱Information and Communications Security影響因子(影響力)




書目名稱Information and Communications Security影響因子(影響力)學(xué)科排名




書目名稱Information and Communications Security網(wǎng)絡(luò)公開度




書目名稱Information and Communications Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Information and Communications Security被引頻次




書目名稱Information and Communications Security被引頻次學(xué)科排名




書目名稱Information and Communications Security年度引用




書目名稱Information and Communications Security年度引用學(xué)科排名




書目名稱Information and Communications Security讀者反饋




書目名稱Information and Communications Security讀者反饋學(xué)科排名





作者: vanquish    時間: 2025-3-21 20:42

作者: ETCH    時間: 2025-3-22 04:26
Kishan Chand Gupta,Subhamoy Maitrahanes which were not yet available via other routes, e.g. .-[2.2]metacyclophane, and phanes, which contain .-aromatic π-decks and are only stable when complexed with the metal. Removing the stabilizing metal unit lead to valence isomerism, which gave interesting hydrocarbons, e.g. propella[3.]prisma
作者: instructive    時間: 2025-3-22 07:32
,Towards the Forgery of a Group Signature without Knowing the Group Center’s Secret,lled “convertible group signature”. Recently, Saeednia pointed out that there are weaknesses in a convertible group signature scheme proposed by Kim et al. Furthermore, Saeednia proposed a modified scheme to eliminate these weaknesses. In this paper, we show that there is a way to forge a group signature even if adopting Saeednia’s modified scheme.
作者: Irascible    時間: 2025-3-22 12:15

作者: Aboveboard    時間: 2025-3-22 13:27
Kazumaro Aoki,Fumitaka Hoshino,Tetsutaro Kobayashi
作者: 諂媚于性    時間: 2025-3-22 17:24
Hee-Wan Kim,Hae-Kyung Rhee,Tai M. Chung,Young Ik Eom,Ung-Mo Kim
作者: Cougar    時間: 2025-3-22 23:06

作者: AMEND    時間: 2025-3-23 02:19

作者: 發(fā)展    時間: 2025-3-23 06:31
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465896.jpg
作者: Banister    時間: 2025-3-23 12:18
978-3-540-42880-0Springer-Verlag Berlin Heidelberg 2001
作者: Hippocampus    時間: 2025-3-23 16:01
Information and Communications Security978-3-540-45600-1Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 顧客    時間: 2025-3-23 20:20
An Intelligent Intruder Model for Security Protocol Analysis,cide when to generate what terms and whether or not to launch a new session, which principal to choose, and what roles the principal will play based on some strand-added rules. By this heuristic method, we can get a finite state space without the explicit configuration needed by most model checking tools.
作者: libertine    時間: 2025-3-24 00:10
https://doi.org/10.1007/3-540-45600-7Authentication; Boolean function; Code; Computational Algebra; Cryptographic Algorithms; Data Security; Di
作者: 色情    時間: 2025-3-24 05:17
Unconditionally-Secure Oblivious Transfer,This paper investigates oblivious transfer protocol based on privacy amplification that uses R.nyi entropy of order . for any 1. 2, the conditions under which the protocol is secure are given. In protocol it makes no assumptions about receiver’s computing power, so under the given conditions the protocol is unconditionally-secure.
作者: 胡言亂語    時間: 2025-3-24 07:34
Performance of WTLS and Its Impact on an M-commerce Transaction,Transaction security is commonly seen as one of the key factors influencing the success of .. In this paper simulation- based performance measurements of the . protocol are presented. Its impact on an exemplary m-commerce transaction is discussed.
作者: decode    時間: 2025-3-24 11:40
Security of Blind Discrete Log Signatures against Interactive Attacks,l times with a legitimate signer and produces from these interactions l + 1 signatures. Security against the new attack requires that the following ROS-problem is intractable: find an .verdetermined,. olvable system of linear equations modulo q with.andom inhomogenities (right sides)..There is an in
作者: 極大痛苦    時間: 2025-3-24 16:47
An Intelligent Intruder Model for Security Protocol Analysis,cide when to generate what terms and whether or not to launch a new session, which principal to choose, and what roles the principal will play based on some strand-added rules. By this heuristic method, we can get a finite state space without the explicit configuration needed by most model checking
作者: 蹣跚    時間: 2025-3-24 20:24

作者: Affable    時間: 2025-3-25 01:06

作者: 誘惑    時間: 2025-3-25 03:35

作者: extemporaneous    時間: 2025-3-25 09:54
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain,rs to embed watermarks in images for various applications, evaluation of watermarking algorithms becomes more and more important. The degradation of watermarked images, which can be measured by signal to noise ratio (SNR) or peak signal to noise ratio (PSNR), is one of the major performance indexes
作者: 發(fā)起    時間: 2025-3-25 14:39

作者: 點燃    時間: 2025-3-25 16:57
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves, years. The problem of how to decrease the amount of addition and scalar multiplication on the Jacobians of hyperelliptic curves so that the implementation speed can be improved is very important for the practical use of HCC. In this paper, Using Frobenius endomorphism as a tool, we discuss the prob
作者: 不知疲倦    時間: 2025-3-25 21:10

作者: 容易做    時間: 2025-3-26 00:22

作者: insurrection    時間: 2025-3-26 04:20
A New Approach for Secure Multicast Routing in a Large Scale Network,henticated and receive/use proper capabilities when they join a multicast group so that illegal hosts or routers may not be able to expand the multicast delivery tree. Messages are encrypted with either a group data key or sender specific key that is shared by all members and changed efficiently whe
作者: 成績上升    時間: 2025-3-26 12:06
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database ncy for multilevel secure database. This protocol expended the twoway donation locking protocol in multilevel secure database, and eliminated unauthorized information flows. Altruistic locking has attempted to reduce delay effect associated with lock release moment by use of the idea of donation. An
作者: Cpap155    時間: 2025-3-26 12:48
Dealing with Uncertainties in Risk Analysis Using Belief Functions,that its result provides a decision-basis for safeguard implementation. However, it must often rely on speculation, educated guesses, incomplete data, and many unproven assumptions. Users of risk analysis often provide their uncertain subjective opinions as input values to risk analysis. Therefore,
作者: nuclear-tests    時間: 2025-3-26 19:05
RBAC for XML Document Stores,erged as an important standard in the area of information representation. XML documents can represent information at different levels of sensitivity. Access control for XML document stores must recognise the finegrained nature of the document structure. In this paper we present an approach to access
作者: white-matter    時間: 2025-3-26 23:06

作者: Volatile-Oils    時間: 2025-3-27 01:31
Encryption Sticks (Randomats), supply of random bits, ready for safe and versatile use by individuals and organizations. Usage ranges from a steady supply of random keys to the prevailing symmetric and stream cryptographies, and up to raw one-time-pad protocols. The contraption dubbed encryption stick, e-stick, or Randomat enabl
作者: 放牧    時間: 2025-3-27 06:02
Applying NCP Logic to the Analysis of SSL 3.0,sured of the freshness and the origin of the pre-master secret when RSA is used for key exchange. We only give specification and analysis of one authentication mode of SSL 3.0 in detail, but all authentication modes have the two weak points. Especially, the flaw of the freshness of the pre-master se
作者: Ccu106    時間: 2025-3-27 11:49
Dongxi Liu,Xiaoyong Li,Yingcai Baiexed phanes turned out to be valuable subjects for NMR-examinations in order to draw a map of the magnetic environment of sandwich complexes, e.g. di(benzene)chromium and ferrocene, and they provided an insight into the effect of ring current disrupture, due to metal complexation. First attempts wer
作者: 施舍    時間: 2025-3-27 14:56

作者: 減去    時間: 2025-3-27 21:10

作者: Synchronism    時間: 2025-3-28 00:52

作者: Vulvodynia    時間: 2025-3-28 05:16
Dealing with Uncertainties in Risk Analysis Using Belief Functions,the consideration of uncertainties in input data should be made when performing a risk analysis. As a tool for expressing and dealing with uncertainties in input data, we suggest the use of belief functions. Weprovide examples of how to use belief functions in qualitative risk analysis methods.
作者: 斗志    時間: 2025-3-28 09:44
Conference proceedings 2001eceding conferences, ICICS’97 was held in Beijing, China, 11-14 November 1997 and ICICS’99 in Sydney, Australia, 9-11 November 1999. The ICICS’97 and ICICS’99 proceedings were released as volumes 1334 and 1726 of Springer- Verlag’s Lecture Notes in Computer Science series. ICICS 2001 was sponsored b
作者: 有助于    時間: 2025-3-28 12:36

作者: 馬籠頭    時間: 2025-3-28 17:28
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain, the scaling parameter in a typical watermarking algorithm and the degradation of watermarked images. Experimental results show that the estimation error of SNR and PSNR is less than 1 dB. Using this relationship, we design an adaptive insertion strategy that can be employed to embed watermarks in natural images with assigned SNR or PSNR.
作者: 分開如此和諧    時間: 2025-3-28 20:07

作者: Invertebrate    時間: 2025-3-29 02:03
Encryption Sticks (Randomats),ns, and wholesale transparency of issues, with potentially broad social implications. The e-stick will be cash purchased in a public shop (anonymity), and this off-Internet item will protect its user from the pervasive data nakedness in cyberspace.
作者: 使糾纏    時間: 2025-3-29 06:58
Cryptanalysis of the Improved User Efficient Blind Signatures,o pointed out that this scheme did not achieve the unlinkability property. Furthermore, he also proposed an improved blind signature scheme to remedy this weakness and reduce the computations for requests. In this article, we presents a linking strategy to show that this improved version is also not a true blind signature scheme.
作者: Juvenile    時間: 2025-3-29 09:58
A Cyclic Window Algorithm for ECC Defined over Extension Fields,lications for a practically used curve in comparison with Lim-Hwang‘s results presented at PKC2000, the fastest previously reported. The algorithm was implemented on computers. As a result, scalar multiplication can be accomplished in 573μs, 595μs, and 254μs on Pentium II (450 MHz), 21164A (500 MHz), and 21264 (500 MHz) computers, respectively.
作者: BINGE    時間: 2025-3-29 11:56
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce, introduce derivatives regarding the uncertain values. This paper shows a theoretical pricing equation of the derivatives when the underlying digital objects have systematic default or revocation risks. We can make use of this pricing to estimate the risks.
作者: 不規(guī)則的跳動    時間: 2025-3-29 15:42
RBAC for XML Document Stores,Access control for XML document stores must recognise the finegrained nature of the document structure. In this paper we present an approach to access control for XML document stores. This framework is based on RBAC and includes a syntax for specifying access control policies for the store.
作者: 圣人    時間: 2025-3-29 23:07

作者: CLAIM    時間: 2025-3-30 02:54
Applying NCP Logic to the Analysis of SSL 3.0,ntication mode of SSL 3.0 in detail, but all authentication modes have the two weak points. Especially, the flaw of the freshness of the pre-master secret may result in reuse of the pre-master secret, and we properly remedy it by introducing a nonce.
作者: 建筑師    時間: 2025-3-30 06:43
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database ature for multilevel secure database. Our protocol ensures serializability, eliminates covert channels to have preference to a lower level transaction, and reduces the starvation of short-lived transaction. The efficiency of the proposed protocol was verified by experimental results.
作者: syring    時間: 2025-3-30 11:42

作者: 星星    時間: 2025-3-30 13:22
Reasoning about Exceptions to Contractson enjoys interesting properties regarding the ABA semantics of results obtained and the determinism of diagnostic answers. As a case study, we present the workings of the framework on a delivery process from e-commerce.
作者: lavish    時間: 2025-3-30 17:05

作者: Common-Migraine    時間: 2025-3-30 23:17

作者: Eulogy    時間: 2025-3-31 01:39

作者: Cpr951    時間: 2025-3-31 08:26

作者: FLUSH    時間: 2025-3-31 10:00
From allegation to formal accusationat Salt Lake historical water levels and predict its future rise and fall with much better accuracy. Therefore, we can observe that fractional-order signal processing techniques provide more powerful tools for forecasting the Great Salt Lake elevation time series with long-range dependent and infinite variance properties.
作者: Brochure    時間: 2025-3-31 16:24

作者: 規(guī)章    時間: 2025-3-31 18:58
Argumentationstheorie nach Perelmanent. Approximately, eight hundred eighty tonnes of waste is dumped at Bandhwari plant. Their role is to gather loss from every street; afterward, compaction of trash happens as smaller than usual exchange center, while the compressed waste is moved to handling office, and the last dry waste would be
作者: 燈絲    時間: 2025-4-1 00:33
Manmohan Dogra,Jayashree Domala,Jenny Dcruz,Safa Hamdaresport layer. We experimented with a dataset consisting of 4 lakh records of synthetic data, out of which we used 70% of the dataset for training purpose and performance measure on the rest 30% of the dataset. Our experimental results show that 97.7% of DDoS attacks were successfully identified and t
作者: 狗窩    時間: 2025-4-1 04:07
,The White Man’s Burden of Educating Natives for Self-Government and the Counter-Claim about the Demtradition. Interpretations of India’s Buddhist heritage as democratic tradition permitted to refute British claims about the White Man’s Burden and White Man’s Mission to impose tutelage on native peoples until they should have advanced far enough in their “education” to “l(fā)earn the responsibilities”
作者: Decline    時間: 2025-4-1 06:10

作者: mitral-valve    時間: 2025-4-1 13:21

作者: 合群    時間: 2025-4-1 18:10
Book 2013ugen des Bewerbers zu sehen. Wie man dies – von der Ansprache, dem Aufbau der Anzeige, der Tonalit?t, der Textstrategie bis zum Satzbau und zur Wortwahl – in der Stellenanzeige umsetzt, erfahren Sie in diesem Buch. ?
作者: PAN    時間: 2025-4-1 22:19
Book 1976t of the conference they could not be considered in any depth. This will be rectified in Vancouver; and already the study of human settlements and their problems is the focus of an intensive progrannne of activities throughout the world in preparation for the HABITAT meeting. The HABITAT conference




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
武山县| 五华县| 陵川县| 从化市| 承德县| 彩票| 天门市| 永新县| 日土县| 阜城县| 紫阳县| 七台河市| 本溪| 莲花县| 文昌市| 北川| 兰西县| 绵阳市| 阜城县| 桦南县| 平武县| 同仁县| 杨浦区| 南雄市| 洪雅县| 苏尼特右旗| 元阳县| 皋兰县| 行唐县| 阜阳市| 涟源市| 普兰县| 白朗县| 普兰县| 安宁市| 富宁县| 宾川县| 盐池县| 香港 | 建始县| 渭源县|