找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Security and Cryptology; First SKLOIS Confere Dengguo Feng,Dongdai Lin,Moti Yung Conference proceedings 2005 Springer-Verlag Be

[復(fù)制鏈接]
查看: 20045|回復(fù): 66
樓主
發(fā)表于 2025-3-21 16:28:51 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Information Security and Cryptology
副標(biāo)題First SKLOIS Confere
編輯Dengguo Feng,Dongdai Lin,Moti Yung
視頻videohttp://file.papertrans.cn/466/465366/465366.mp4
叢書名稱Lecture Notes in Computer Science
圖書封面Titlebook: Information Security and Cryptology; First SKLOIS Confere Dengguo Feng,Dongdai Lin,Moti Yung Conference proceedings 2005 Springer-Verlag Be
描述The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware,theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer’s Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous ?elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume. In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as wel
出版日期Conference proceedings 2005
關(guān)鍵詞authentication; bluetooth security; cryptanalysis; cryptographic protocols; cryptography; dos attacks; err
版次1
doihttps://doi.org/10.1007/11599548
isbn_softcover978-3-540-30855-3
isbn_ebook978-3-540-32424-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer-Verlag Berlin Heidelberg 2005
The information of publication is updating

書目名稱Information Security and Cryptology影響因子(影響力)




書目名稱Information Security and Cryptology影響因子(影響力)學(xué)科排名




書目名稱Information Security and Cryptology網(wǎng)絡(luò)公開度




書目名稱Information Security and Cryptology網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Information Security and Cryptology被引頻次




書目名稱Information Security and Cryptology被引頻次學(xué)科排名




書目名稱Information Security and Cryptology年度引用




書目名稱Information Security and Cryptology年度引用學(xué)科排名




書目名稱Information Security and Cryptology讀者反饋




書目名稱Information Security and Cryptology讀者反饋學(xué)科排名




單選投票, 共有 1 人參與投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

1票 100.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 20:51:57 | 只看該作者
板凳
發(fā)表于 2025-3-22 03:35:11 | 只看該作者
地板
發(fā)表于 2025-3-22 08:33:52 | 只看該作者
5#
發(fā)表于 2025-3-22 09:31:57 | 只看該作者
6#
發(fā)表于 2025-3-22 15:28:09 | 只看該作者
Towards a General RC4-Like Keystream Generatorit RC4. Further, on a 32-bit processor the generator is 3.1 times faster than original RC4. We also show that it can resist attacks that are successful on the original RC4. The generator is suitable for high speed software encryption.
7#
發(fā)表于 2025-3-22 20:30:04 | 只看該作者
8#
發(fā)表于 2025-3-22 23:24:09 | 只看該作者
You Can Prove So Many Things in Zero-Knowledgeresults about proofs of non-zero knowledge, and, in the process, revisit previously studied protocols, described as ‘proofs of partial knowledge’, which are particular cases of proofs of non-zero knowledge.
9#
發(fā)表于 2025-3-23 02:45:36 | 只看該作者
10#
發(fā)表于 2025-3-23 06:04:56 | 只看該作者
Constructing Secure Proxy Cryptosystemd Silverberg, the FSPE scheme of Canetti et al. and the scheme of Fujisaki and Okamoto, and is proven to be secure based on the hardness of bilinear Diffie-Hellman assumption. At last, we give an identity based (ID-based) version of the proxy cryptosystem based on time segmentation.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-22 17:58
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
凌云县| 贵德县| 侯马市| 商南县| 青田县| 安达市| 乌审旗| 承德市| 夏河县| 会东县| 遂昌县| 安多县| 昭苏县| 崇州市| 资源县| 庆安县| 石嘴山市| 澎湖县| 邢台市| 临夏县| 芒康县| 湛江市| 汾阳市| 德保县| 五家渠市| 华容县| 深州市| 丰顺县| 仙游县| 凤翔县| 利辛县| 曲水县| 葫芦岛市| 广元市| 曲周县| 仁化县| 道真| 张家港市| 西平县| 垣曲县| 吉安市|