標題: Titlebook: Information and Communications Security; 8th International Co Peng Ning,Sihan Qing,Ninghui Li Conference proceedings 2006 Springer-Verlag B [打印本頁] 作者: Clique 時間: 2025-3-21 18:13
書目名稱Information and Communications Security影響因子(影響力)
書目名稱Information and Communications Security影響因子(影響力)學(xué)科排名
書目名稱Information and Communications Security網(wǎng)絡(luò)公開度
書目名稱Information and Communications Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information and Communications Security被引頻次
書目名稱Information and Communications Security被引頻次學(xué)科排名
書目名稱Information and Communications Security年度引用
書目名稱Information and Communications Security年度引用學(xué)科排名
書目名稱Information and Communications Security讀者反饋
書目名稱Information and Communications Security讀者反饋學(xué)科排名
作者: Infusion 時間: 2025-3-21 23:54 作者: 半身雕像 時間: 2025-3-22 01:54 作者: 戰(zhàn)役 時間: 2025-3-22 05:33
Kyung-Ah Shimracterized of these proteases are the falcipains, a family of four papain-family enzymes. Falcipain-2 and falcipain-3 act in concert with other proteases to hydrolyze host erythrocyte hemoglobin in the parasite food vacuole. Disruption of the falcipain-2 gene led to a transient block in hemoglobin h作者: ALLEY 時間: 2025-3-22 10:09
Huafei Zhu,Jianying Zhoulin-resistant strains raises the special interest in virulence mechanism of this pathogen. among a number of extracellular virulence factors, . secretes several proteases of three catalytic classes—metallo, serine and papain-like cysteine proteases. the expression of proteolytic enzymes is strictly 作者: Pedagogy 時間: 2025-3-22 16:54 作者: 稀釋前 時間: 2025-3-22 18:48 作者: 易于出錯 時間: 2025-3-22 23:47
Onur Ac?i?mez,?etin Kaya Ko?grasp and use the already wide and still growing range of diverse methods currently employed to study CF so as to understand it in its multidisciplinary nature.? .Cystic Fibrosis: Diagnosis and Protocols. aims to provide the CF research community and related researchers with a very wide range of hig作者: 龍蝦 時間: 2025-3-23 02:11 作者: 偽證 時間: 2025-3-23 05:37 作者: Ophthalmoscope 時間: 2025-3-23 15:41 作者: neurologist 時間: 2025-3-23 21:22
Danfeng Yao,Keith B. Frikken,Mikhail J. Atallah,Roberto Tamassias through (1) management of chronic infection; (2) clearance of mucous secretions; and (3) reduction of airway inflammation. Central to the concepts of precision medicine and coproduction among the individual, family, and clinical care team, the management of CF pulmonary disease should be tailored 作者: 譏諷 時間: 2025-3-24 00:42
Yingpeng Sang,Hong Shen,Yasuo Tan,Naixue Xiong the field, the text outlines the progressive nature of CF as well as the impact of this autosomal recessive disease on the respiratory, gastrointestinal, endocrine, rheumatologic, and renal systems, as well as the patient’s mental health.? The book begins with a chapter describing the history of cy作者: refine 時間: 2025-3-24 03:48 作者: cancellous-bone 時間: 2025-3-24 06:51
He Geh . remain undefined, it seems clear that infection with this organism provides the stimulus for the chronic inflammation and periodic exacerbations that characterize the progressive lung disease in almost all CF patients. Not only does the inflammatory response fail to eradicate the inciting organi作者: Negligible 時間: 2025-3-24 13:17
Geir Olav Dyrkolbotn,Einar Snekkenesh . remain undefined, it seems clear that infection with this organism provides the stimulus for the chronic inflammation and periodic exacerbations that characterize the progressive lung disease in almost all CF patients. Not only does the inflammatory response fail to eradicate the inciting organi作者: 補角 時間: 2025-3-24 18:12
Himanshu Khurana,Jin Heo,Meenal Pantractions that dictate the physiology of a healthy cell and tissue and, when defective, the pathophysiology characteristic of cystic fibrosis (CF) disease. To begin to address the organization and operation of the extensive cystic fibrosis protein network dictated by simultaneous and sequential inter作者: Conjuction 時間: 2025-3-24 19:25 作者: Interstellar 時間: 2025-3-25 00:51 作者: aesthetician 時間: 2025-3-25 05:59
A Topological Condition for Solving Fair Exchange in Byzantine Environmentsted and untrusted processes, and propose a specification of the fair exchange problem that clearly separates safety and liveness, via fine-grained properties. We then show that the solvability of fair exchange depends on a necessary and sufficient topological condition, which we name the . condition作者: 表狀態(tài) 時間: 2025-3-25 10:48
A Security Analysis of the Precise Time Protocol (Short Paper)o (a) incorrectly resynchronize clocks, (b) rearrange or disrupt the hierarchy of PTP clocks, (c) bring the protocol participants into an inconsistent state, or (d) deprive victim slave clocks from synchronization in ways undetectable by generic network intrusion detection systems. We also propose c作者: Abnormal 時間: 2025-3-25 14:23
An Identity-Based Proxy Signature Scheme from Pairingslf of the original signer. In this paper we propose an ID-based proxy signature scheme from bilinear pairings. We provide exact security proof of the proposed ID-based proxy signature scheme in the random oracle model under the Computational Diffie-Hellman assumption without using Forking Lemma.作者: Licentious 時間: 2025-3-25 19:47 作者: 遵循的規(guī)范 時間: 2025-3-25 21:01
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper)any schemes proposed, but most of them have already been found flawed due to the lack of formal security analysis. On the cryptanalysis of this type of schemes, in this paper, we further review two recently proposed schemes and show that their security claims are invalid. To address the current issu作者: 抗生素 時間: 2025-3-26 01:44
Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Sizeproposed method to this scheme, the ciphertext size is reduced from . to .(.+log(./.)) without a substantial increase in the decryption-key size, where .,. denote the maximum number of colluders in a coalition and the total number of receivers respectively. The resulting scheme also supports black-b作者: Mettle 時間: 2025-3-26 07:40 作者: 纖細 時間: 2025-3-26 11:24
A Construction for General and Efficient Oblivious Commitment Based Envelope Protocolsation about the attributes. Previous OCBE protocols are designed by taking zero-knowledge proof protocols that prove a committed value satisfies some property and changing the protocols so that instead of one party proving to the other party, the two parties compute two keys that agree if and only i作者: 哎呦 時間: 2025-3-26 15:39 作者: 樣式 時間: 2025-3-26 17:16 作者: 不整齊 時間: 2025-3-27 00:54 作者: Negligible 時間: 2025-3-27 04:40
Point-Based Trust: Define How Much Privacy Is Worth Specifically, Bob values each credential with a certain number of points, and requires a minimum total threshold of points before granting Alice access to a resource. In turn, Alice values each of her credentials with a privacy score that indicates her reluctance to reveal that credential. Bob’s va作者: cogitate 時間: 2025-3-27 08:58 作者: 含沙射影 時間: 2025-3-27 13:07
Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper)ased hash protocol proposed by Molnar and Wagner presents a scalable, privacy-preserving solution. Previous analyses of this protocol concluded that an attacker who can extract secrets from a large number of tags can compromise privacy of other tags. We propose a new metric for information leakage i作者: cylinder 時間: 2025-3-27 13:45 作者: cochlea 時間: 2025-3-27 21:17 作者: 合法 時間: 2025-3-28 00:04
From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solutiontherefore minimally trusted in distributed systems leading to their usefulness in many applications. However, till date no application of proxy encryption has been deployed and used in practice. In this work we describe our efforts in developing a deployable secure mailing list solution based on pro作者: Spirometry 時間: 2025-3-28 03:19
https://doi.org/10.1007/11935308NC; access control; authentication; control; cryptoanalysis; cryptographic protocol; cryptography; data sec作者: corpus-callosum 時間: 2025-3-28 07:56
978-3-540-49496-6Springer-Verlag Berlin Heidelberg 2006作者: ARIA 時間: 2025-3-28 10:24
Information and Communications Security978-3-540-49497-3Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 煩擾 時間: 2025-3-28 18:01 作者: CRUMB 時間: 2025-3-28 21:27 作者: A精確的 時間: 2025-3-29 02:29 作者: GUILT 時間: 2025-3-29 03:38
A Topological Condition for Solving Fair Exchange in Byzantine Environments. The first part of this result, i.e., the condition is necessary, was shown in a companion paper and is briefly recalled here. The second part, i.e., the condition is sufficient, is the focal point of this paper. The correctness proof of this second part consists in proposing a solution to fair exchange in the aforementioned model.作者: 嫌惡 時間: 2025-3-29 10:43
Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Sizeox tracing and enjoys the following properties: Even if a pirate decoder does not respond any further queries when it detects itself being examined, the pirate decoder can be traced back to a person who participated in its construction. A tracer’s key, which is necessary for black-box tracing, is public.作者: 黃瓜 時間: 2025-3-29 12:00
Trace-Driven Cache Attacks on AES (Short Paper)se two different metrics, specifically, the expected number of necessary traces and the cost of the analysis phase, for the cost evaluation purposes. Each of these metrics represents the cost of a different phase of the attack.作者: 服從 時間: 2025-3-29 19:19
Conference proceedings 2006h, North Carolina, USA, December 4–7, 2006. The ICICS conference series is an established forum that brings together researchersand scholars involved in m- tiple disciplines of Information and Communications Security in order to foster exchangeof ideas. The past sevenICICS conferences wereheld in Be作者: 造反,叛亂 時間: 2025-3-29 21:30
Point-Based Trust: Define How Much Privacy Is Worthr credentials that achieves Bob’s required threshold for access, yet is of as small a value to her as possible. We give protocols for computing such a subset of Alice’s credentials without revealing any of the two parties’ above-mentioned private information.作者: 取之不竭 時間: 2025-3-30 01:22
An Anonymous Authentication Scheme for Identification Cardcity and efficiency such that all computation can be carried out by a resource-limited identification card. We proved our scheme is secure under the strong RSA assumption and the decisional Diffie-Hellman assumption.作者: 問到了燒瓶 時間: 2025-3-30 04:03
0302-9743 in Raleigh, North Carolina, USA, December 4–7, 2006. The ICICS conference series is an established forum that brings together researchersand scholars involved in m- tiple disciplines of Information and Communications Security in order to foster exchangeof ideas. The past sevenICICS conferences were作者: Abduct 時間: 2025-3-30 09:30 作者: 尋找 時間: 2025-3-30 13:59 作者: Insatiable 時間: 2025-3-30 17:21
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper)particular, we show that a secure password based key exchange protocol can be transformed efficiently to a smartcard and password based two-factor authentication scheme provided that there exist pseudorandom functions and collision-resistant hash functions.作者: Notorious 時間: 2025-3-30 23:08
A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols satisfies a predicate, we have an OCBE protocol for that predicate with constant additional cost. Compared with previous OCBE protocols, our construction is more general, more efficient, and has wide applicability.作者: monologue 時間: 2025-3-31 01:15
Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints ttom-up strategy for a particular part of the proof; this enables the algorithm to touch only those credentials that are related to the query, which are likely to be a small fraction of all the credentials in the system.作者: Invigorate 時間: 2025-3-31 05:31
Efficient Protocols for Privacy Preserving Matching Against Distributed Datasetsmputation and communication costs of our PPSI protocol decrease by 81% and 17% respectively, and the computation and communication costs of our PPSM protocol decrease by 80% and 50% respectively. In practical utilities both of our protocols save computation time and communication bandwidth.作者: Tidious 時間: 2025-3-31 12:44 作者: 初學(xué)者 時間: 2025-3-31 14:30 作者: 相容 時間: 2025-3-31 20:49 作者: Allege 時間: 2025-4-1 00:58 作者: fructose 時間: 2025-4-1 02:55
Defining and Measuring Policy Coverage in Testing Access Control Policies requests for achieving the same coverage as the originally generated requests. To evaluate coverage-based request reduction and its effect on fault detection, we have conducted an experiment with mutation testing on a set of real policies. Our experimental results show that the coveragebased test r作者: 粗鄙的人 時間: 2025-4-1 09:49
From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solutionizes the use of COTS components to help in deployment, developing the proxy encryption protocol to satisfy requirements and to fit within the component architecture, implementing and testing the solution, and packaging the release. As evidence of its deployability, the resulting secure mailing list 作者: comely 時間: 2025-4-1 11:49 作者: 怒目而視 時間: 2025-4-1 18:20 作者: DOLT 時間: 2025-4-1 20:02
Jeanette Tsang,Konstantin BeznosovIn many respects the biology of the various cyst nematode species is similar, although with variations due todifferent interactions with hosts and geographical location. Thus, research on any one species has general applicability and this is particularly so with regard to evaluation of control measures, or to978-1-4612-9318-7978-1-4613-2251-1作者: Constant 時間: 2025-4-2 01:38 作者: 歡樂中國 時間: 2025-4-2 03:50
Huafei Zhu,Jianying Zhough staphopain a displays activity similar to cathepsins, recognising hydrophobic residues at P2 position and large charged residues at P1, staphopain B differs significantly, showing significant preference towards β-branched residues at P2 and accepting only small, neutral residues at the P1 positio