派博傳思國際中心

標(biāo)題: Titlebook: Cryptography and Security Systems; Third International Zbigniew Kotulski,Bogdan Ksi??opolski,Katarzyna Ma Conference proceedings 2014 Spri [打印本頁]

作者: Corticosteroids    時(shí)間: 2025-3-21 16:44
書目名稱Cryptography and Security Systems影響因子(影響力)




書目名稱Cryptography and Security Systems影響因子(影響力)學(xué)科排名




書目名稱Cryptography and Security Systems網(wǎng)絡(luò)公開度




書目名稱Cryptography and Security Systems網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Cryptography and Security Systems被引頻次




書目名稱Cryptography and Security Systems被引頻次學(xué)科排名




書目名稱Cryptography and Security Systems年度引用




書目名稱Cryptography and Security Systems年度引用學(xué)科排名




書目名稱Cryptography and Security Systems讀者反饋




書目名稱Cryptography and Security Systems讀者反饋學(xué)科排名





作者: 彎彎曲曲    時(shí)間: 2025-3-21 21:49
On a Cipher Based on Pseudo-random Walks on Graphs,In the paper a cipher which uses transition graph in the encryption and decryption processes is presented. It is created based on some ideas of dynamic systems (symbolic dynamics). The introduced cipher is tested according to the suggestions of FIPS 140-2 standard and the results are presented in the paper.
作者: 哪有黃油    時(shí)間: 2025-3-22 01:23
Communications in Computer and Information Sciencehttp://image.papertrans.cn/d/image/240583.jpg
作者: 毗鄰    時(shí)間: 2025-3-22 06:39
https://doi.org/10.1007/978-3-662-44893-9cryptographic protocols; cybercrime; data protection; formal methods and theory of security; network sec
作者: 慢跑鞋    時(shí)間: 2025-3-22 11:11
978-3-662-44892-2Springer-Verlag Berlin Heidelberg 2014
作者: COLON    時(shí)間: 2025-3-22 13:49
Numerical Semigroups and Bounds on Impossible Differential Attacks on Generalized Feistel Schemes, we provide upper and lower bounds for the maximum number of rounds when impossible differential technique is applicable for any cipher from the family. These estimations do not depend on the type of Feistel scheme and the number of non-linear functions.
作者: COLON    時(shí)間: 2025-3-22 20:30
Conference proceedings 2014oland, in September 2014. The 17 revised full papers presented were carefully reviewed and selected from 43 submissions. 7 of those papers concern different areas of cryptography, while the remaining 10 deal with recent problems of cryptographic protocols.
作者: Pruritus    時(shí)間: 2025-3-22 21:33

作者: INERT    時(shí)間: 2025-3-23 04:35
Behavioral Hardware Description Languages, we provide upper and lower bounds for the maximum number of rounds when impossible differential technique is applicable for any cipher from the family. These estimations do not depend on the type of Feistel scheme and the number of non-linear functions.
作者: Audiometry    時(shí)間: 2025-3-23 08:56
Behavioral Hardware Description Languages,ir-by-pair, in such a way that the sums of the code word lengths of an original pair and its substitute are equal. Thus our method preserves structures and lengths of bit streams that result from the Huffman encoding. This is advantageous if such a bit stream is embedded in a higher-level data conta
作者: 難取悅    時(shí)間: 2025-3-23 10:17
Behavioral Hardware Description Languages,iate maps .(.) by relations of degree . with invertible decomposition via presentation of the explicit construction. Such a construction is based on the edge transitive family of graphs .(., .). It uses the equations of connected component of the graph. The walk on the graph can be given by the sequ
作者: 雇傭兵    時(shí)間: 2025-3-23 13:58
Behavioral Hardware Description Languages,ptic curves over finite fields of prime order, we propose a method of generating such sequences of points with algorithms driven by a chaotic map. Our construction improves randomness of the sequence generated since it combines good statistical properties of an ECPRNG (Elliptic Curve Pseudo-Random N
作者: Obsessed    時(shí)間: 2025-3-23 20:03
Behavioral Hardware Description Languages,rd fraud that is prevalent on the Internet. Our method is founded on the identity-based cryptography and it secures the credit card transactions in such a way that many types of credit card fraud become either impossible or much more difficult for the attacker to perform simply by stealing the credi
作者: Exterior    時(shí)間: 2025-3-23 23:31
John D. Villasenor,Jiangtao WenSome new codes have an evident advantage in comparison with the .(.,.) based codes [9]. The new graphs are not edge transitive. So, they are not isomorphic to the Cayley graphs or those from the .(.,.) family, [14]. We use computer simulation to investigate spectral properties of graphs used for the
作者: Absenteeism    時(shí)間: 2025-3-24 03:36

作者: Concomitant    時(shí)間: 2025-3-24 08:49
John D. Villasenor,Jiangtao Wenits participants. The scheme makes use of advantages of identity based signature scheme and hash function for the verifiability which does not require much computation. It checks either dealer or participant(s) honesty, that means a corrupted dealer may provide a fake secret or a participant may pro
作者: 青少年    時(shí)間: 2025-3-24 12:22
Wavelet Image and Video Compression sequences generated by the position digit algebra function, which has a large average period lengths. This function uses only the radix . additions (for some .?≥?2), which makes it very efficient from a computational point of view, and suitable enough to be implemented in the RFID tags’ logic. The
作者: 是限制    時(shí)間: 2025-3-24 17:32
Wavelet Image and Video Compressionsecurity assumptions become invalid, and proposed a three-round long-term secure two-party key establishment protocol. Building on a two-party solution of Bohli et al., we present an authenticated two-round group key establishment protocol which remains secure if either a Computational Bilinear Diff
作者: ABHOR    時(shí)間: 2025-3-24 21:23

作者: MOCK    時(shí)間: 2025-3-25 02:01

作者: 殺子女者    時(shí)間: 2025-3-25 04:45
John D. Villasenor,Jiangtao Wenanisms. This paper describes an architecture of MobInfoSec system for sharing documents with sensitive information using fine-grained access rules described by general access structures. However, the proper usage of general access structures requires trusted components and strong authentication prot
作者: 模范    時(shí)間: 2025-3-25 08:50

作者: ORBIT    時(shí)間: 2025-3-25 15:21

作者: duplicate    時(shí)間: 2025-3-25 16:45
Thad B. Welch,Michael J. Walker,Ray A. Foranber of independent constraints connected with: dynamic changes of the environment, security assumptions, network limitations and end-users personal requirements, the context factors need specific treatment to be real support for an optimal route selection. The proposed framework systemizes the roles
作者: Morbid    時(shí)間: 2025-3-25 22:06

作者: condescend    時(shí)間: 2025-3-26 02:33

作者: 制度    時(shí)間: 2025-3-26 08:07

作者: Herd-Immunity    時(shí)間: 2025-3-26 10:26
Encrypting Huffman-Encoded Data by Substituting Pairs of Code Words without Changing the Bit Count ir-by-pair, in such a way that the sums of the code word lengths of an original pair and its substitute are equal. Thus our method preserves structures and lengths of bit streams that result from the Huffman encoding. This is advantageous if such a bit stream is embedded in a higher-level data conta
作者: faction    時(shí)間: 2025-3-26 12:45

作者: 雄偉    時(shí)間: 2025-3-26 17:16
Statistical Analysis of the Chaos-Driven Elliptic Curve Pseudo-random Number Generators,ptic curves over finite fields of prime order, we propose a method of generating such sequences of points with algorithms driven by a chaotic map. Our construction improves randomness of the sequence generated since it combines good statistical properties of an ECPRNG (Elliptic Curve Pseudo-Random N
作者: intolerance    時(shí)間: 2025-3-27 00:12
Identity-Based Cryptography in Credit Card Payments,rd fraud that is prevalent on the Internet. Our method is founded on the identity-based cryptography and it secures the credit card transactions in such a way that many types of credit card fraud become either impossible or much more difficult for the attacker to perform simply by stealing the credi
作者: 遺傳    時(shí)間: 2025-3-27 02:32

作者: Microgram    時(shí)間: 2025-3-27 07:50

作者: 不確定    時(shí)間: 2025-3-27 12:22

作者: emulsify    時(shí)間: 2025-3-27 16:08

作者: TEM    時(shí)間: 2025-3-27 21:01

作者: 代替    時(shí)間: 2025-3-27 22:55
Optimizing SHA256 in Bitcoin Mining,nt system. Bitcoin depends on well-known cryptographic standards such as SHA-256. In this paper we revisit the cryptographic process which allows one to make money by producing new bitcoins. We reformulate this problem as a specific sort of Constrained Input Small Output (CISO) hashing problem and r
作者: pericardium    時(shí)間: 2025-3-28 05:51

作者: Acupressure    時(shí)間: 2025-3-28 08:55
Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devicanisms. This paper describes an architecture of MobInfoSec system for sharing documents with sensitive information using fine-grained access rules described by general access structures. However, the proper usage of general access structures requires trusted components and strong authentication prot
作者: 合適    時(shí)間: 2025-3-28 10:32

作者: refine    時(shí)間: 2025-3-28 17:24
Comparison and Assessment of Security Modeling Approaches in Terms of the QoP-ML,xity of designing secure systems, distinct approaches that allow developers to focus on particular properties of the system of importance for their purpose are proposed. The majority of them are model-oriented since modeling helps show relationships between processes and can be used to predict the e
作者: lattice    時(shí)間: 2025-3-28 21:09
Context-Aware Secure Routing Protocol for Real-Time Services,ber of independent constraints connected with: dynamic changes of the environment, security assumptions, network limitations and end-users personal requirements, the context factors need specific treatment to be real support for an optimal route selection. The proposed framework systemizes the roles
作者: AVANT    時(shí)間: 2025-3-28 23:48

作者: dowagers-hump    時(shí)間: 2025-3-29 07:05

作者: 階層    時(shí)間: 2025-3-29 09:20
On Multivariate Cryptosystems Based on Polynomially Compressed Maps with Invertible Decomposition,ariate transformation of unbounded degree (compressed map). The public user has some additional compression rules which allow for fast computation of the value . on a given flag. The key holder (Alice) knows .(.), special decompression rules allow her to decrypt fast. To hide the graph Alice deforma
作者: 單片眼鏡    時(shí)間: 2025-3-29 12:50

作者: PHAG    時(shí)間: 2025-3-29 16:41

作者: 膠狀    時(shí)間: 2025-3-29 21:28
Behavioral Hardware Description Languages,iate remedy. However, the decreasing costs of more advanced hardware and the fairly fast cycle of reissuing new credit cards make it possible to include identity-based cryptography methods to credit cards in the near future.
作者: tariff    時(shí)間: 2025-3-30 03:29
Wavelet Image and Video Compressions is less than it seems and it depends on a certain cryptographic constant which is estimated to be at most 1.89. These optimizations enable bitcoin miners to save countless millions of dollars per year in electricity bills.
作者: Blazon    時(shí)間: 2025-3-30 05:07

作者: Euphonious    時(shí)間: 2025-3-30 11:52

作者: 工作    時(shí)間: 2025-3-30 14:17

作者: Abduct    時(shí)間: 2025-3-30 20:25

作者: 混雜人    時(shí)間: 2025-3-31 00:15
Optimizing SHA256 in Bitcoin Mining,s is less than it seems and it depends on a certain cryptographic constant which is estimated to be at most 1.89. These optimizations enable bitcoin miners to save countless millions of dollars per year in electricity bills.
作者: 逃避現(xiàn)實(shí)    時(shí)間: 2025-3-31 03:13

作者: 旁觀者    時(shí)間: 2025-3-31 07:38

作者: Cacophonous    時(shí)間: 2025-3-31 09:34
Comparison and Assessment of Security Modeling Approaches in Terms of the QoP-ML,anguage (QoP-ML). We focus on their capabilities to model relevant information during various phases of security analysis. To assess and compare miscellaneous modeling systems we use a systematic methodology to point out their promiscuous aspects in context of the QoP-ML.
作者: 1分開    時(shí)間: 2025-3-31 14:50
Encrypting Huffman-Encoded Data by Substituting Pairs of Code Words without Changing the Bit Count s and lengths of bit streams that result from the Huffman encoding. This is advantageous if such a bit stream is embedded in a higher-level data container, like a multimedia file. The algorithm has been evaluated using text data and static Huffman dictionaries.
作者: 成績上升    時(shí)間: 2025-3-31 20:53
A Lightweight Authentication Protocol for RFID,for some .?≥?2), which makes it very efficient from a computational point of view, and suitable enough to be implemented in the RFID tags’ logic. The protocol appears to have good privacy and security properties.
作者: lavish    時(shí)間: 2025-3-31 22:09
Long-Term Secure Two-Round Group Key Establishment from Pairings,n of Bohli et al., we present an authenticated two-round group key establishment protocol which remains secure if either a Computational Bilinear Diffie Hellman problem is hard or a server, who shares a symmetric key with each user, is uncorrupted.
作者: QUAIL    時(shí)間: 2025-4-1 02:45





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
买车| 东阿县| 铅山县| 九台市| 洱源县| 成安县| 措美县| 垫江县| 阿鲁科尔沁旗| 海口市| 荃湾区| 吉首市| 泽库县| 黄大仙区| 吉木乃县| 武强县| 安平县| 高台县| 灵寿县| 翁牛特旗| 华安县| 祁门县| 苍南县| 调兵山市| 二连浩特市| 苏州市| 伊金霍洛旗| 丹巴县| 增城市| 连南| 新兴县| 富阳市| 洛隆县| 清丰县| 抚顺市| 新竹县| 石家庄市| 镇平县| 定西市| 恭城| 额济纳旗|