找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information and Communications Security; Third International Sihan Qing,Tatsuaki Okamoto,Jianying Zhou Conference proceedings 2001 Springe

[復(fù)制鏈接]
樓主: 方面
41#
發(fā)表于 2025-3-28 17:28:17 | 只看該作者
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain, the scaling parameter in a typical watermarking algorithm and the degradation of watermarked images. Experimental results show that the estimation error of SNR and PSNR is less than 1 dB. Using this relationship, we design an adaptive insertion strategy that can be employed to embed watermarks in natural images with assigned SNR or PSNR.
42#
發(fā)表于 2025-3-28 20:07:42 | 只看該作者
43#
發(fā)表于 2025-3-29 02:03:41 | 只看該作者
Encryption Sticks (Randomats),ns, and wholesale transparency of issues, with potentially broad social implications. The e-stick will be cash purchased in a public shop (anonymity), and this off-Internet item will protect its user from the pervasive data nakedness in cyberspace.
44#
發(fā)表于 2025-3-29 06:58:30 | 只看該作者
Cryptanalysis of the Improved User Efficient Blind Signatures,o pointed out that this scheme did not achieve the unlinkability property. Furthermore, he also proposed an improved blind signature scheme to remedy this weakness and reduce the computations for requests. In this article, we presents a linking strategy to show that this improved version is also not a true blind signature scheme.
45#
發(fā)表于 2025-3-29 09:58:24 | 只看該作者
A Cyclic Window Algorithm for ECC Defined over Extension Fields,lications for a practically used curve in comparison with Lim-Hwang‘s results presented at PKC2000, the fastest previously reported. The algorithm was implemented on computers. As a result, scalar multiplication can be accomplished in 573μs, 595μs, and 254μs on Pentium II (450 MHz), 21164A (500 MHz), and 21264 (500 MHz) computers, respectively.
46#
發(fā)表于 2025-3-29 11:56:14 | 只看該作者
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce, introduce derivatives regarding the uncertain values. This paper shows a theoretical pricing equation of the derivatives when the underlying digital objects have systematic default or revocation risks. We can make use of this pricing to estimate the risks.
47#
發(fā)表于 2025-3-29 15:42:13 | 只看該作者
RBAC for XML Document Stores,Access control for XML document stores must recognise the finegrained nature of the document structure. In this paper we present an approach to access control for XML document stores. This framework is based on RBAC and includes a syntax for specifying access control policies for the store.
48#
發(fā)表于 2025-3-29 23:07:43 | 只看該作者
49#
發(fā)表于 2025-3-30 02:54:53 | 只看該作者
Applying NCP Logic to the Analysis of SSL 3.0,ntication mode of SSL 3.0 in detail, but all authentication modes have the two weak points. Especially, the flaw of the freshness of the pre-master secret may result in reuse of the pre-master secret, and we properly remedy it by introducing a nonce.
50#
發(fā)表于 2025-3-30 06:43:45 | 只看該作者
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database ature for multilevel secure database. Our protocol ensures serializability, eliminates covert channels to have preference to a lower level transaction, and reduces the starvation of short-lived transaction. The efficiency of the proposed protocol was verified by experimental results.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-27 20:47
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
通渭县| 共和县| 崇礼县| 齐河县| 北安市| 稷山县| 奉新县| 沽源县| 巫山县| 德格县| 阜平县| 寿光市| 会东县| 磴口县| 昌吉市| 阳谷县| 合江县| 达日县| 阳朔县| 于田县| 婺源县| 乐至县| 西宁市| 溆浦县| 溧阳市| 吉安市| 翁源县| 宾川县| 武安市| 吉安市| 泰来县| 安吉县| 新余市| 进贤县| 平阴县| 沙坪坝区| 伊宁市| 武山县| 治县。| 赤水市| 保亭|