找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Security and Cryptology; First SKLOIS Confere Dengguo Feng,Dongdai Lin,Moti Yung Conference proceedings 2005 Springer-Verlag Be

[復(fù)制鏈接]
查看: 20040|回復(fù): 66
樓主
發(fā)表于 2025-3-21 16:28:51 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Information Security and Cryptology
副標(biāo)題First SKLOIS Confere
編輯Dengguo Feng,Dongdai Lin,Moti Yung
視頻videohttp://file.papertrans.cn/466/465366/465366.mp4
叢書名稱Lecture Notes in Computer Science
圖書封面Titlebook: Information Security and Cryptology; First SKLOIS Confere Dengguo Feng,Dongdai Lin,Moti Yung Conference proceedings 2005 Springer-Verlag Be
描述The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory of Information Security of the Chinese Academy of Sciences. It was held in Beijing, China, December 15-17,2005andwassponsoredbytheInstituteofSoftware,theChineseAcademy of Sciences, the Graduate School of the Chinese Academy of Sciences and the National Science Foundation of China. The conference proceedings, represe- ing invited and contributed papers, are published in this volume of Springer’s Lecture Notes in Computer Science (LNCS) series. The area of research covered by CISC has been gaining importance in recent years, and a lot of fundamental, experimental and applied work has been done, advancing the state of the art. The program of CISC 2005 covered numerous ?elds of research within the general scope of the conference. The International Program Committee of the conference received a total of 196 submissions (from 21 countries). Thirty-three submissions were selected for presentation as regular papers and are part of this volume. In addition to this track, the conference also hosted a short-paper track of 32 presentations that were carefully selected as wel
出版日期Conference proceedings 2005
關(guān)鍵詞authentication; bluetooth security; cryptanalysis; cryptographic protocols; cryptography; dos attacks; err
版次1
doihttps://doi.org/10.1007/11599548
isbn_softcover978-3-540-30855-3
isbn_ebook978-3-540-32424-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer-Verlag Berlin Heidelberg 2005
The information of publication is updating

書目名稱Information Security and Cryptology影響因子(影響力)




書目名稱Information Security and Cryptology影響因子(影響力)學(xué)科排名




書目名稱Information Security and Cryptology網(wǎng)絡(luò)公開度




書目名稱Information Security and Cryptology網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Information Security and Cryptology被引頻次




書目名稱Information Security and Cryptology被引頻次學(xué)科排名




書目名稱Information Security and Cryptology年度引用




書目名稱Information Security and Cryptology年度引用學(xué)科排名




書目名稱Information Security and Cryptology讀者反饋




書目名稱Information Security and Cryptology讀者反饋學(xué)科排名




單選投票, 共有 1 人參與投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

1票 100.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 20:51:57 | 只看該作者
板凳
發(fā)表于 2025-3-22 03:35:11 | 只看該作者
地板
發(fā)表于 2025-3-22 08:33:52 | 只看該作者
5#
發(fā)表于 2025-3-22 09:31:57 | 只看該作者
6#
發(fā)表于 2025-3-22 15:28:09 | 只看該作者
Towards a General RC4-Like Keystream Generatorit RC4. Further, on a 32-bit processor the generator is 3.1 times faster than original RC4. We also show that it can resist attacks that are successful on the original RC4. The generator is suitable for high speed software encryption.
7#
發(fā)表于 2025-3-22 20:30:04 | 只看該作者
8#
發(fā)表于 2025-3-22 23:24:09 | 只看該作者
You Can Prove So Many Things in Zero-Knowledgeresults about proofs of non-zero knowledge, and, in the process, revisit previously studied protocols, described as ‘proofs of partial knowledge’, which are particular cases of proofs of non-zero knowledge.
9#
發(fā)表于 2025-3-23 02:45:36 | 只看該作者
10#
發(fā)表于 2025-3-23 06:04:56 | 只看該作者
Constructing Secure Proxy Cryptosystemd Silverberg, the FSPE scheme of Canetti et al. and the scheme of Fujisaki and Okamoto, and is proven to be secure based on the hardness of bilinear Diffie-Hellman assumption. At last, we give an identity based (ID-based) version of the proxy cryptosystem based on time segmentation.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-22 14:26
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
凌源市| 繁峙县| 石泉县| 邹城市| 丁青县| 饶河县| 横峰县| 孝感市| 西畴县| 井冈山市| 托里县| 麦盖提县| 屯门区| 安丘市| 彩票| 永定县| 资中县| 司法| 玉环县| 辉县市| 墨竹工卡县| 高碑店市| 山西省| 安达市| 五原县| 新竹市| 沙河市| 永定县| 建宁县| 西藏| 乌海市| 菏泽市| 颍上县| 平利县| 泰兴市| 准格尔旗| 藁城市| 靖州| 芦山县| 巴楚县| 英吉沙县|