標(biāo)題: Titlebook: Information and Communications Security; 6th International Co Javier Lopez,Sihan Qing,Eiji Okamoto Conference proceedings 2004 Springer-Ver [打印本頁(yè)] 作者: BRISK 時(shí)間: 2025-3-21 17:07
書目名稱Information and Communications Security影響因子(影響力)
書目名稱Information and Communications Security影響因子(影響力)學(xué)科排名
書目名稱Information and Communications Security網(wǎng)絡(luò)公開(kāi)度
書目名稱Information and Communications Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書目名稱Information and Communications Security被引頻次
書目名稱Information and Communications Security被引頻次學(xué)科排名
書目名稱Information and Communications Security年度引用
書目名稱Information and Communications Security年度引用學(xué)科排名
書目名稱Information and Communications Security讀者反饋
書目名稱Information and Communications Security讀者反饋學(xué)科排名
作者: 最小 時(shí)間: 2025-3-21 20:21 作者: 跟隨 時(shí)間: 2025-3-22 03:10 作者: Pepsin 時(shí)間: 2025-3-22 07:02
On the Security of a Multi-party Certified Email Protocol,scussed for years and a number of research papers appeared in the literature. But most of them deal with the two-party scenarios, i.e., there are only one sender and one recipient. In some applications, however, the same certified message may need to be sent to a set of recipients. In ISC’02, Ferrer作者: 思考而得 時(shí)間: 2025-3-22 12:24 作者: 察覺(jué) 時(shí)間: 2025-3-22 13:24
,, – Secure Electronic Payment in Mobile Ad Hoc Networks,do not fulfill the requirements imposed by the highly dynamic and decentralized nature of MANETs. Either they rely on digital coins that suffer from usability problems, or they build on cellular phone technology which is bound to the availability of a fixed infrastructure. Therefore, we propose ., a作者: MOT 時(shí)間: 2025-3-22 18:34 作者: concentrate 時(shí)間: 2025-3-22 23:08
Provably Secure Authenticated Tree Based Group Key Agreement,arua .’s unauthenticated ternary tree based multi-party extension of Joux’s key agreement protocol. The security is in the standard model as formalized by Bresson .. The proof is based on the techniques used by Katz and Yung in proving the security of their key agreement protocol.作者: Lime石灰 時(shí)間: 2025-3-23 01:30 作者: 出生 時(shí)間: 2025-3-23 08:26 作者: 踉蹌 時(shí)間: 2025-3-23 18:56 作者: 廢除 時(shí)間: 2025-3-23 22:27 作者: 束縛 時(shí)間: 2025-3-24 05:30 作者: Commonwealth 時(shí)間: 2025-3-24 09:22
A Semi-fragile Steganographic Digital Signature for Images,. This paper presents a new semi-fragile steganographic technique for embedding digital signatures in images. This is achieved by using a novel modified Bit-Plane Complexity Segmentation (BPCS) Based Steganography scheme. Semi-fragile implies survival from limited processing, which is achieved by ut作者: 擦掉 時(shí)間: 2025-3-24 12:51
Identification of Traitors Using a Trellis, dishonest users, called traitors, collude to create a pirate copy that hides their identities, by putting together different parts of their copies. If the sets to be embedded are the codewords of an error correcting code then efficient algorithms can be used to trace the traitors. In this paper we 作者: 權(quán)宜之計(jì) 時(shí)間: 2025-3-24 18:02 作者: Cryptic 時(shí)間: 2025-3-24 19:16
Reflector Attack Traceback System with Pushback Based iTrace Mechanism,ques, since the marked information written by any routers between the attacker and the reflectors will be lost in the replied packets from the reflectors. In response to such attacks, advanced IP traceback technology must be suggested. This study proposed an improved . technique that identifies DDoS作者: DAMP 時(shí)間: 2025-3-25 01:10 作者: semble 時(shí)間: 2025-3-25 04:53 作者: 失望昨天 時(shí)間: 2025-3-25 10:20 作者: Kinetic 時(shí)間: 2025-3-25 13:08 作者: 狂熱語(yǔ)言 時(shí)間: 2025-3-25 16:16
Jianying Zhouwith MRI in a common stereotaxic reference coordinate system.Description.This stereotaxic atlas of the ferret brain provides detailed architectonic subdivisions of the cortical and subcortical areas in the ferret brain using high-quality histological material stained for cells and myelin together wi作者: intertwine 時(shí)間: 2025-3-25 22:29 作者: Robust 時(shí)間: 2025-3-26 02:30 作者: 被告 時(shí)間: 2025-3-26 05:15
Tieyan Li,Yongdong Wu,Di Ma,Huafei Zhu,Robert H. Denger bioenergetic processes such?as denitrification or sulfate and sulfite reduction. Moreover, electron transfer is a key step in many enzymatic reactions. The framework of Marcus theory provides the theoretical basis to describe the kinetics of these reactions. The parameters to calculate rate const作者: 極為憤怒 時(shí)間: 2025-3-26 12:02
Ratna Dutta,Rana Barua,Palash Sarkarrefore, assumed until recently to already have made use of heme cofactors, a notion bolstered by molecular phylogenies of several heme-bearing enzymes. The discovery of a second pathway for heme biosynthesis, predominantly present in Archaea, was subsequently interpreted to indicate independent orig作者: 油氈 時(shí)間: 2025-3-26 13:40
Yuichi Komano,Kazuo Ohtai-subunit membrane protein complexes: photosystem I (PSI), photosystem II (PSII), the cytochrome b6-f complex (cyt...) and ATP-synthase (F.F.). These protein complexes are connected by soluble electron carriers that are vital not only for the proper function of ATP and NADPH production but also to r作者: 輕推 時(shí)間: 2025-3-26 17:21 作者: GILD 時(shí)間: 2025-3-26 21:50
Spyros T. Halkidis,Alexander Chatzigeorgiou,George Stephanidesr predicting potential neurodegeneration, particularly following chronic brain hypoperfusion. This proposal is based on a series of experiments in rats subjected to mild chronic brain hypoperfusion and tested at determined time points for regional cytochrome oxidase activity, visuo-spatial memory, r作者: packet 時(shí)間: 2025-3-27 02:57
Yasunori Ishihara,Yumi Shimakawa,Toru Fujiwara that different individuals have different capacities to metabolize various drugs.. Such variation may result, in part, from an allelic distribution of P-450 isozymes;. or it may also result from individual variations in the level of a specific isozyme.. Also, deficiencies of different steroid hydro作者: 結(jié)束 時(shí)間: 2025-3-27 09:12 作者: 卵石 時(shí)間: 2025-3-27 11:26
Ilanit Moodahi,Ehud Gudes,Oz Lavee,Amnon Meiselstochrome P450 (CYP)-mediated metabolism. Therefore, hepatic clearance is undeniably one of the most critical pharmacokinetic parameters. In the early stages of drug discovery, the in vitro hepatic metabolic stability assay carries great importance as it provides a time- and cost-effective route for 作者: 有效 時(shí)間: 2025-3-27 15:59
Rakan El-Khalil,Angelos D. Keromytisue structures is small relative to the large number of P450s in Nature, it now is clear that the overall P450-fold is highly conserved and restricted to P450s and a small handful of other heme–thiolate enzymes. These crystal structures exhibit adaptations that underlie interactions with specific pro作者: septicemia 時(shí)間: 2025-3-27 21:03 作者: Morose 時(shí)間: 2025-3-27 23:13
Marcel Fernandez,Miguel Sorianoue structures is small relative to the large number of P450s in Nature, it now is clear that the overall P450-fold is highly conserved and restricted to P450s and a small handful of other heme–thiolate enzymes. These crystal structures exhibit adaptations that underlie interactions with specific pro作者: 無(wú)法治愈 時(shí)間: 2025-3-28 05:02
Joaquin Garcia,Fabien Autrel,Joan Borrell,Sergio Castillo,Frederic Cuppens,Guillermo Navarroue structures is small relative to the large number of P450s in Nature, it now is clear that the overall P450-fold is highly conserved and restricted to P450s and a small handful of other heme–thiolate enzymes. These crystal structures exhibit adaptations that underlie interactions with specific pro作者: 高深莫測(cè) 時(shí)間: 2025-3-28 09:42 作者: 可卡 時(shí)間: 2025-3-28 14:07
Javier Lopez,Sihan Qing,Eiji OkamotoIncludes supplementary material: 作者: 壓艙物 時(shí)間: 2025-3-28 17:45 作者: Judicious 時(shí)間: 2025-3-28 22:09
Provably Secure Authenticated Tree Based Group Key Agreement,arua .’s unauthenticated ternary tree based multi-party extension of Joux’s key agreement protocol. The security is in the standard model as formalized by Bresson .. The proof is based on the techniques used by Katz and Yung in proving the security of their key agreement protocol.作者: 佛刊 時(shí)間: 2025-3-29 00:49
978-3-540-23563-7Springer-Verlag Berlin Heidelberg 2004作者: Incise 時(shí)間: 2025-3-29 06:44 作者: Allege 時(shí)間: 2025-3-29 09:18
0302-9743 Overview: Includes supplementary material: 978-3-540-23563-7978-3-540-30191-2Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 重力 時(shí)間: 2025-3-29 14:13 作者: 公理 時(shí)間: 2025-3-29 15:40 作者: stress-test 時(shí)間: 2025-3-29 23:15
A Semi-fragile Steganographic Digital Signature for Images,ed Bit-Plane Complexity Segmentation (BPCS) Based Steganography scheme. Semi-fragile implies survival from limited processing, which is achieved by utilising Convolutional coding, a Forward Error Correcting (FEC) channel coding technique, in the embedding.作者: Hallmark 時(shí)間: 2025-3-30 02:31
Identification of Traitors Using a Trellis,f the sets to be embedded are the codewords of an error correcting code then efficient algorithms can be used to trace the traitors. In this paper we present a tracing algorithm, that by applying the Viterbi algorithm to the trellis representation of a cyclic traceability code, finds all possibly identifiable traitors.作者: SPURN 時(shí)間: 2025-3-30 04:47 作者: Irrigate 時(shí)間: 2025-3-30 08:32 作者: Spinal-Tap 時(shí)間: 2025-3-30 12:59 作者: SLING 時(shí)間: 2025-3-30 18:26
A Qualitative Evaluation of Security Patterns, been mentioned. Finally, threat categories for a software system have been identified. Based on these facts, it would be useful to evaluate known security patterns based on how well they follow each guideline, how they encounter with possible problems in building secure software and for which of the threat categories they do take care of.作者: 貪婪的人 時(shí)間: 2025-3-30 23:07
Hydan: Hiding Information in Program Binaries,rmation in each executable (approximately . bit encoding rate), although this amount is sufficient for some of the potential applications mentioned. We conclude by discussing potential improvements to the capacity of the channel and other future work.作者: Obscure 時(shí)間: 2025-3-31 03:13 作者: 雪白 時(shí)間: 2025-3-31 06:19 作者: BRAVE 時(shí)間: 2025-3-31 12:05
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN, analysis shows that the scheme is secure and cost effective. The scheme is indeed content aware and ensures the verification rate intuitively reflecting a meaningful stream. Further on, we describe the general method of publishing and retrieving a stream in p2p CDN.作者: 條街道往前推 時(shí)間: 2025-3-31 15:11 作者: AROMA 時(shí)間: 2025-3-31 21:05
A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet,s to find an assignment of users/roles to tasks which satisfy the workflow constraints. The agents use constraint processing to solve their respective problems, and also attempt to achieve an optimized solution.作者: 暴發(fā)戶 時(shí)間: 2025-3-31 23:38
On the Minimal Assumptions of Group Signature Schemes,plies the existence of secure public-key encryption schemes. Our result shows that the construction of secure group signature schemes based solely on the existence of one-way functions is unlikely. This is in contrast to what is known for standard signature schemes, which can be constructed from any one-way function.作者: membrane 時(shí)間: 2025-4-1 02:29
Robust Metering Schemes for General Access Structures,viding detection of such illegal behavior and propose a correction. In this paper we extend the linear algebra approach from Nikov et al. in order to build . unconditionally secure general metering schemes. As a tool to achieve this goal we introduce . matrices and an operation on such matrices. Certain properties of this operation are proven.作者: 遺留之物 時(shí)間: 2025-4-1 09:22 作者: Ventricle 時(shí)間: 2025-4-1 13:23 作者: Demulcent 時(shí)間: 2025-4-1 17:39 作者: 心痛 時(shí)間: 2025-4-1 19:17
favorable anatomic results, including improved thickness on optical coherence topography scans, are more common than improved visual results. This may reflect that surgical intervention is often performed for refractory DME cases with long-standing edema, with limited potential for substantial impr作者: 刺激 時(shí)間: 2025-4-1 23:24
Michel Abdalla,Bogdan Warinschiment of this entity is described in another chapter. The differential diagnosis should include epiretinal membrane, macular hole, age-related macular degeneration, central serous chorioretinopathy, and, most importantly, vitreomacular traction (VMT) syndrome [1–4].作者: 讓步 時(shí)間: 2025-4-2 03:44 作者: 內(nèi)部 時(shí)間: 2025-4-2 07:51
Javier Herranz,Germán Sáezreference base to collect and compare data from any kind of research in the ferret brain..Key Features..Provides the first ferret brain atlas with detaileddelineations of cortical and subcortical areas in frontal plane...Provides the most detailed brain atlas of acarnivore to date. ..Presents a ster