派博傳思國(guó)際中心

標(biāo)題: Titlebook: Communications and Multimedia Security; 9th IFIP TC-6 TC-11 Jana Dittmann,Stefan Katzenbeisser,Andreas Uhl Conference proceedings 2005 IFI [打印本頁(yè)]

作者: Insularity    時(shí)間: 2025-3-21 16:10
書(shū)目名稱Communications and Multimedia Security影響因子(影響力)




書(shū)目名稱Communications and Multimedia Security影響因子(影響力)學(xué)科排名




書(shū)目名稱Communications and Multimedia Security網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱Communications and Multimedia Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱Communications and Multimedia Security被引頻次




書(shū)目名稱Communications and Multimedia Security被引頻次學(xué)科排名




書(shū)目名稱Communications and Multimedia Security年度引用




書(shū)目名稱Communications and Multimedia Security年度引用學(xué)科排名




書(shū)目名稱Communications and Multimedia Security讀者反饋




書(shū)目名稱Communications and Multimedia Security讀者反饋學(xué)科排名





作者: 娘娘腔    時(shí)間: 2025-3-21 23:57
Signature Amortization Using Multiple Connected Chainsat are appended to a signature packet on the overhead. We introduce a measure so as to know the number of packets receivers need to buffer until they can authenticate the received packets. The number of chains of our model plays a main role in the efficiency of our scheme in terms of loss resistance
作者: colony    時(shí)間: 2025-3-22 01:46

作者: groggy    時(shí)間: 2025-3-22 05:19
Introduction to Deep Foundationsat are appended to a signature packet on the overhead. We introduce a measure so as to know the number of packets receivers need to buffer until they can authenticate the received packets. The number of chains of our model plays a main role in the efficiency of our scheme in terms of loss resistance
作者: 學(xué)術(shù)討論會(huì)    時(shí)間: 2025-3-22 11:04

作者: 觀察    時(shí)間: 2025-3-22 16:49
An Instruction Set Extension for Fast and Memory-Efficient AES Implementationch systems. The Advanced Encryption Standard (AES) specifies one of the most important cryptographic algorithms today and has received a lot of attention from researchers. Most prior work has focused on efficient implementations with throughput as main criterion. However, AES implementations in smal
作者: 觀察    時(shí)間: 2025-3-22 18:33
Self-healing Key Distribution Schemes with Sponsorizationrk. The group manager broadcasts in every session some packet of information in order to provide a common key to members of the session group. The goal of self-healing key distribution schemes is that, even if the broadcast is lost in a certain session, the group member can recover the key from the
作者: deviate    時(shí)間: 2025-3-22 22:00
Effective Protection Against Phishing and Web Spoofingthey target non-cryptographic components, such as the user or the user-browser interface. This means that cryptographic security protocols, such as the SSL/TLS protocol, do not provide a complete solution to tackle the attacks and must be complemented by additional protection mechanisms. In this pap
作者: Morsel    時(shí)間: 2025-3-23 02:16
Identity Based DRM: Personal Entertainment Domains handle content. These restrictions apply specifically in networked environments. Authorized Domain (AD) DRM concepts remove, or at least reduce, several of these restrictions to a large extent, while at the same time taking into account the content providers’ need to limit the proliferation of con
作者: receptors    時(shí)間: 2025-3-23 05:59

作者: fetter    時(shí)間: 2025-3-23 11:44

作者: ellagic-acid    時(shí)間: 2025-3-23 17:37

作者: 粗魯?shù)娜?nbsp;   時(shí)間: 2025-3-23 21:49
Puzzle – A Novel Video Encryption Algorithm concerns of these services for their commercial usages, e.g. in video on de mand services or in video conferences. In particular, video encryption algorithms are strongly required that fulfill real-time requirements. In this paper we present the video encryption algorithm . to encrypting video stre
作者: 鞠躬    時(shí)間: 2025-3-24 00:08

作者: Ruptured-Disk    時(shí)間: 2025-3-24 05:43
On Reversibility of Random Binning Techniques: Multimedia Perspectivese the capabilities of unauthorized users to perform hidden data removal using solely a signal processing approach based on optimal estimation as well as consider reversibility on the side of authorized users who have the knowledge of key used for the message hiding.
作者: sperse    時(shí)間: 2025-3-24 06:39

作者: 溫和女孩    時(shí)間: 2025-3-24 13:34
Non-interactive Watermark Detection for a Correlation-Based Watermarking Schememation to the detecting party..This paper presents a detailed practical construction and implementation results of a correlation-based non-blind watermarking scheme in the non-interactive zero-knowledge setting. We extensively describe the modifications and hurdles that had to be overcome to transfo
作者: syncope    時(shí)間: 2025-3-24 17:18
Video Surveillance: A Distributed Approach to Protect Privacy users, we have to assure, that the recorded video-material is only available to a subset of authorized users under exactly previously defined circumstances. In this paper we propose a CCTV video surveillance system providing privacy in a distributed way using threshold multi-party computation. Due
作者: congenial    時(shí)間: 2025-3-24 22:43

作者: micturition    時(shí)間: 2025-3-25 00:37
Using XACML for Privacy Control in SAML-Based Identity Federationsty provider. Access to this information is managed using so-called Attribute Release Policies (ARPs). In this paper, we first analyze various shortcomings of existing ARP implementations; then, we demonstrate that the eXtensible Access Control Markup Language (XACML) is very suitable for the task. W
作者: 香料    時(shí)間: 2025-3-25 07:19
Verifier-Tuple as a Classifier for Biometric Handwriting Authentication – Combination of Syntax and istic is the combination of syntax and semantics. It implies a determination of four distinct levels of syntax and semantics to lower complexity and structure information. We demonstrate the concept’s impacts on on-line handwritings and the user verification, and clarify the benefit of applying info
作者: Carbon-Monoxide    時(shí)間: 2025-3-25 07:40

作者: VAN    時(shí)間: 2025-3-25 12:25

作者: 流出    時(shí)間: 2025-3-25 17:14
Representation of Seismic Ground Motionsams in software. It is fast enough to fulfill real-time constraints and to provide a sufficient security. . is a video compression independent algorithm which can be easily incorporated into existing multimedia systems.
作者: organism    時(shí)間: 2025-3-25 21:21

作者: 芳香一點(diǎn)    時(shí)間: 2025-3-26 00:21

作者: 協(xié)議    時(shí)間: 2025-3-26 07:22
https://doi.org/10.1007/0-306-48162-6 solution. Though fast-handoff is indeed an open issue, mobility may even help to build security systems. The paper describes a decentralised access control framework for WiFi networks that exploits mobility to avoid a central authority to be always online.
作者: foodstuff    時(shí)間: 2025-3-26 09:51
Soil Dynamics and Foundation Modelingnd OMA DRM, and we compare it with an alternative approach. Then, we illustrate the system operation through a content composition use case, and finally, we present the software tools that we have already developed and the future work.
作者: –吃    時(shí)間: 2025-3-26 15:54
https://doi.org/10.1007/0-306-48162-6ve been performed on identical data sets for the original and the enhanced system and the first results presented in this paper show that an increase of recognition accuracy can be achieved by our new multialgorithmic approach for the handwriting modality.
作者: 巨頭    時(shí)間: 2025-3-26 16:48

作者: Ligneous    時(shí)間: 2025-3-26 23:45
Multimodal Biometrics for Voice and Handwritingve been performed on identical data sets for the original and the enhanced system and the first results presented in this paper show that an increase of recognition accuracy can be achieved by our new multialgorithmic approach for the handwriting modality.
作者: Biguanides    時(shí)間: 2025-3-27 02:27
Introduction to Deep Foundationse SSL/TLS protocol, do not provide a complete solution to tackle the attacks and must be complemented by additional protection mechanisms. In this paper, we summarize, discuss, and evaluate the effectiveness of such mechanisms against (large-scale) phishing and Web spoofing attacks.
作者: 弄皺    時(shí)間: 2025-3-27 06:49

作者: 燒瓶    時(shí)間: 2025-3-27 11:17
Functioning of the Soil System,tronic health record system which allows the patient to control who has access to her health records. Furthermore, provided she does not misuse the system, a doctor will remain anonymous with respect to any central authority.
作者: 不開(kāi)心    時(shí)間: 2025-3-27 17:24

作者: Indelible    時(shí)間: 2025-3-27 20:43

作者: 彩色    時(shí)間: 2025-3-28 00:14

作者: Amorous    時(shí)間: 2025-3-28 03:27
Slope Stability Due to Seismic Loadingnexpensive extension to a 32-bit general-purpose processor which allows compact and fast AES implementations. We have integrated this extension into the SPARC?V8-compatible LEON-2 processor and measured a speedup by a factor of up to 1.43 for encryption and 1.3 for decryption. At the same time the code size has been reduced by 30–40%.
作者: COW    時(shí)間: 2025-3-28 09:08

作者: 雄辯    時(shí)間: 2025-3-28 12:18
https://doi.org/10.1007/978-3-319-63543-9nimized by introducing edge weights..We have implemented an algorithm based on this approach with support for several types of image and audio files and we have conducted computational studies to evaluate the performance of the algorithm.
作者: Malcontent    時(shí)間: 2025-3-28 16:44
G. Kannan,Evangelin Ramani Sujathaitical detection input, i.e. the watermark vector and the original data is cryptographically concealed from the verifying party using a commitment scheme. Our prototype implementation is very efficient and is an evidence of the practical feasibility of zero-knowledge watermark detection.
作者: condemn    時(shí)間: 2025-3-28 21:57
Functioning of the Soil System,al as well as adding new users to the system. If a pre-defined threshold is reached, a shared update of the master secret and the according re-encryption of previously stored ciphertext without revealing the plaintext is provided.
作者: 孤獨(dú)無(wú)助    時(shí)間: 2025-3-29 00:30

作者: Flavouring    時(shí)間: 2025-3-29 05:56
A Key Embedded Video Codec for Secure Video Multicasthm and our proposed key information frame format. After a series of simulation experiments, we find that the new codec can satisfy the special demand of media-dependent approach. At the same time, the codec provides good performance.
作者: 強(qiáng)行引入    時(shí)間: 2025-3-29 10:36
A Graph–Theoretic Approach to Steganographynimized by introducing edge weights..We have implemented an algorithm based on this approach with support for several types of image and audio files and we have conducted computational studies to evaluate the performance of the algorithm.
作者: 向外供接觸    時(shí)間: 2025-3-29 15:03
Non-interactive Watermark Detection for a Correlation-Based Watermarking Schemeitical detection input, i.e. the watermark vector and the original data is cryptographically concealed from the verifying party using a commitment scheme. Our prototype implementation is very efficient and is an evidence of the practical feasibility of zero-knowledge watermark detection.
作者: 反饋    時(shí)間: 2025-3-29 18:28

作者: resuscitation    時(shí)間: 2025-3-29 19:57
Puzzle – A Novel Video Encryption Algorithmams in software. It is fast enough to fulfill real-time constraints and to provide a sufficient security. . is a video compression independent algorithm which can be easily incorporated into existing multimedia systems.
作者: Coordinate    時(shí)間: 2025-3-30 00:18

作者: 條街道往前推    時(shí)間: 2025-3-30 07:24

作者: reptile    時(shí)間: 2025-3-30 12:11
Decentralised Access Control in 802.11 Networks solution. Though fast-handoff is indeed an open issue, mobility may even help to build security systems. The paper describes a decentralised access control framework for WiFi networks that exploits mobility to avoid a central authority to be always online.
作者: Optometrist    時(shí)間: 2025-3-30 12:46

作者: Asseverate    時(shí)間: 2025-3-30 19:04

作者: dominant    時(shí)間: 2025-3-30 23:23
Modeling of Shallow Foundation DynamicsIt allows efficient computation of multiple instances of oblivious transfer protocols. We apply this protocol to improve the fast simultaneous contract signing protocol, recently proposed in [11], which gains its speed from computation of time-consuming operations in advance. Using batch oblivious t
作者: Cubicle    時(shí)間: 2025-3-31 01:20

作者: CREEK    時(shí)間: 2025-3-31 07:46

作者: 表兩個(gè)    時(shí)間: 2025-3-31 10:18

作者: 無(wú)可爭(zhēng)辯    時(shí)間: 2025-3-31 14:54

作者: 濕潤(rùn)    時(shí)間: 2025-3-31 21:31
Soil Dynamics and Foundation Modelingresearch area. To have a secure and trusted system we need to take into account aspects such as digital rights management (DRM), certification, control and security. As current solutions rely on proprietary architectures and tools, we propose an open architecture, as general as possible and not rest
作者: 連系    時(shí)間: 2025-4-1 00:38
Introduction to Deep Foundationsm. The hash chains structure of amortization schemes and the number of hash values appended to other packets affect the efficiency of the authentication scheme specially against packet loss. Which packets should have hashes appended to the signature packet and how many hashes to append to it have no
作者: cathartic    時(shí)間: 2025-4-1 04:44

作者: Additive    時(shí)間: 2025-4-1 06:32

作者: 周興旺    時(shí)間: 2025-4-1 13:13
Dynamic and Cyclic Properties of Soilsks and replacement attacks even in case of restricting the amount of encryption to 1% – 2% of the data. The low encryption effort required is due to the exploitation of the interdependencies among resolution layers in the JBIG hierarchical progressive coding mode.
作者: 密切關(guān)系    時(shí)間: 2025-4-1 17:58
Dynamic and Cyclic Properties of Soilse the capabilities of unauthorized users to perform hidden data removal using solely a signal processing approach based on optimal estimation as well as consider reversibility on the side of authorized users who have the knowledge of key used for the message hiding.
作者: 設(shè)想    時(shí)間: 2025-4-1 22:32

作者: corpuscle    時(shí)間: 2025-4-1 23:07

作者: 無(wú)法治愈    時(shí)間: 2025-4-2 05:41
Functioning of the Soil System, users, we have to assure, that the recorded video-material is only available to a subset of authorized users under exactly previously defined circumstances. In this paper we propose a CCTV video surveillance system providing privacy in a distributed way using threshold multi-party computation. Due
作者: Etching    時(shí)間: 2025-4-2 10:50

作者: 縫紉    時(shí)間: 2025-4-2 11:23
Functioning of the Soil System,ty provider. Access to this information is managed using so-called Attribute Release Policies (ARPs). In this paper, we first analyze various shortcomings of existing ARP implementations; then, we demonstrate that the eXtensible Access Control Markup Language (XACML) is very suitable for the task. W




歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
蒙自县| 抚州市| 贡山| 五大连池市| 泰州市| 城固县| 珠海市| 南昌市| 安福县| 泸水县| 沾化县| 尼勒克县| 乳山市| 抚顺县| 锡林郭勒盟| 杭锦旗| 东山县| 沁源县| 西林县| 托克托县| 灌阳县| 繁昌县| 泰兴市| 柯坪县| 于田县| 即墨市| 山阴县| 电白县| 腾冲县| 宝鸡市| 南宫市| 德惠市| 砀山县| 民和| 吴旗县| 永德县| 平远县| 临江市| 襄樊市| 和田市| 雅江县|