標(biāo)題: Titlebook: Information Security; 8th International Co Jianying Zhou,Javier Lopez,Feng Bao Conference proceedings 2005 Springer-Verlag Berlin Heidelber [打印本頁] 作者: 自由 時(shí)間: 2025-3-21 20:09
書目名稱Information Security影響因子(影響力)
書目名稱Information Security影響因子(影響力)學(xué)科排名
書目名稱Information Security網(wǎng)絡(luò)公開度
書目名稱Information Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Security被引頻次
書目名稱Information Security被引頻次學(xué)科排名
書目名稱Information Security年度引用
書目名稱Information Security年度引用學(xué)科排名
書目名稱Information Security讀者反饋
書目名稱Information Security讀者反饋學(xué)科排名
作者: GRILL 時(shí)間: 2025-3-22 00:14 作者: 協(xié)迫 時(shí)間: 2025-3-22 02:47 作者: BUMP 時(shí)間: 2025-3-22 05:31 作者: eustachian-tube 時(shí)間: 2025-3-22 12:10
Information Security978-3-540-31930-6Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: affect 時(shí)間: 2025-3-22 15:10 作者: 魯莽 時(shí)間: 2025-3-22 19:40 作者: abreast 時(shí)間: 2025-3-22 22:40
SVision: A Network Host-Centered Anomaly Visualization Techniquety of hosts that exchange messages among themselves. Our aim is to graphically highlight those hosts that represent a possible threat for the network, so that a network administrator will be able to further explore the anomaly and decide upon the responses that are appropriate. We choose to test our作者: 蕁麻 時(shí)間: 2025-3-23 04:53
Time-Based Release of Confidential Information in Hierarchical Settingss either crucial or highly prized. This is the case for stock market values, blind auction bidding amounts, many large corporations’strategic business plans, certain news agencies timed publications, and some licensed software updates. Hierarchical timed-based information release (HTIR) schemes enab作者: Radiation 時(shí)間: 2025-3-23 08:04
“Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lotteryis paper a unified approach to the design and implementation of electronic lotteries with the focus on pragmatic trust establishment. This approach follows closely the methodologies commonly employed in the development of general information systems. However, central to the proposed approach is the 作者: ARIA 時(shí)間: 2025-3-23 12:26
A Privacy Preserving Rental Systemmitigate this concern, we present a privacy preserving rental system where interests of both the users and the service provider are protected. In particular, users are enabled to engage in a rental service in an anonymous manner; however, users who keep overdue rental items are subject to .. Moreove作者: FER 時(shí)間: 2025-3-23 16:39
Constant Round Dynamic Group Key Agreementcy and is provably secure under DDH assumption in the security model of Bresson . providing, we feel, better security guarantee than previously published results. The protocol is efficient in terms of both communication and computation power.作者: Entropion 時(shí)間: 2025-3-23 20:11
A Key Pre-distribution Scheme for Wireless?Sensor Networks: Merging Blocks in Combinatorial Designed to construct a (., ., ., .) configuration and then randomly chosen blocks are merged to form sensor nodes. We present detailed mathematical analysis of the number of nodes, number of keys per node and the probability that a link gets affected if certain number of nodes are compromised. The techni作者: APEX 時(shí)間: 2025-3-24 02:03 作者: COUCH 時(shí)間: 2025-3-24 02:59
On the Notion of Statistical Security in Simulatability?Definitions framework allows to formulate and analyze multi-party protocols modularly by providing a composition theorem for protocols. However, we show that the notion of statistical security, as defined by Backes, Pfitzmann and Waidner for the reactive simulatability framework, does not allow for secure comp作者: Musculoskeletal 時(shí)間: 2025-3-24 07:20 作者: detach 時(shí)間: 2025-3-24 11:59 作者: cuticle 時(shí)間: 2025-3-24 16:59 作者: 凹處 時(shí)間: 2025-3-24 19:23
,: Routing-Assisted Defense Against DDoS Attackso a network under attack. Our approach uses routing to redirect all traffic destined to a customer under attack to strategically-located . proxies, where servers filter out attack traffic and forward authorized traffic toward its intended destination..Our architecture can be deployed incrementally b作者: compassion 時(shí)間: 2025-3-25 00:23
IPSec Support in NAT-PT Scenario for IPv6 Transitionder conversion causes the receiver to fail to verify the TCP/UDP checksum and the ICV value of the AH header. This study analyses potential problems in applying the IPSec between the IPv6-only node and an IPv4-only node, and proposes a solution to enable the receiver successfully ver-ify the IPSec p作者: 使害羞 時(shí)間: 2025-3-25 05:14 作者: farewell 時(shí)間: 2025-3-25 08:46 作者: 兵團(tuán) 時(shí)間: 2025-3-25 13:56
Efficient and Proactive Threshold Signcryptionlications which utilize the two basic blocks encryption and digital signature to secure message delivery (such as SSL, SSH). Combining the three tools organically leads to an interesting security tool termed as threshold signcryption which can be used in distributed systems especially the mobile net作者: 起來了 時(shí)間: 2025-3-25 16:02 作者: 谷類 時(shí)間: 2025-3-25 21:57
Hardware Architecture and Cost Estimates for Breaking SHA-1HA-1 has not been broken yet, but the new collision search techniques proposed by Wang et al. reduced the computational complexity down to 2., which is only 1/2,000 of the 2. operations needed for a birthday attack. The complexity is still too large even for today’s supercomputers, but no feasibilit作者: Osteoporosis 時(shí)間: 2025-3-26 00:09 作者: zonules 時(shí)間: 2025-3-26 06:10 作者: AXIS 時(shí)間: 2025-3-26 11:28
Iosif-Viorel Onut,Bin Zhu,Ali A. Ghorbani and software systems can be seamlessly integrated for a comRemote web-based experimentation, enabling students and researchers to access the laboratory anytime via the Internet, is becoming an increasingly attractive way to complement or even replace traditional laboratory sessions. Placing a video作者: insightful 時(shí)間: 2025-3-26 13:08 作者: adj憂郁的 時(shí)間: 2025-3-26 17:08 作者: 神經(jīng) 時(shí)間: 2025-3-26 22:54
Yanjiang Yang,Beng Chin Ooi and software systems can be seamlessly integrated for a comRemote web-based experimentation, enabling students and researchers to access the laboratory anytime via the Internet, is becoming an increasingly attractive way to complement or even replace traditional laboratory sessions. Placing a video作者: Palpitation 時(shí)間: 2025-3-27 05:06 作者: 忍耐 時(shí)間: 2025-3-27 07:41
Dibyendu Chakrabarti,Subhamoy Maitra,Bimal Roy and software systems can be seamlessly integrated for a comRemote web-based experimentation, enabling students and researchers to access the laboratory anytime via the Internet, is becoming an increasingly attractive way to complement or even replace traditional laboratory sessions. Placing a video作者: 使高興 時(shí)間: 2025-3-27 12:24
Hyung Mok Lee,Kyung Ju Ha,Kyo Min Ku and software systems can be seamlessly integrated for a comRemote web-based experimentation, enabling students and researchers to access the laboratory anytime via the Internet, is becoming an increasingly attractive way to complement or even replace traditional laboratory sessions. Placing a video作者: inquisitive 時(shí)間: 2025-3-27 15:33
Dennis Hofheinz,Dominique Unruh and software systems can be seamlessly integrated for a comRemote web-based experimentation, enabling students and researchers to access the laboratory anytime via the Internet, is becoming an increasingly attractive way to complement or even replace traditional laboratory sessions. Placing a video作者: absolve 時(shí)間: 2025-3-27 18:21 作者: 死亡率 時(shí)間: 2025-3-27 22:53 作者: Extemporize 時(shí)間: 2025-3-28 04:39
Jean Monnerat,Serge Vaudenaysco State Uni- versity; (2) clients and participants at the Biofeedback and Family Therapy Institute in Berkeley; and (3) participants in peak performance training programs. The goals of this workbook are to offer experiences to facilitate life-long learning of skills to enhance health and growth. W作者: CLEFT 時(shí)間: 2025-3-28 08:06
Stephen T. Chou,Angelos Stavrou,John Ioannidis,Angelos D. Keromytissco State Uni- versity; (2) clients and participants at the Biofeedback and Family Therapy Institute in Berkeley; and (3) participants in peak performance training programs. The goals of this workbook are to offer experiences to facilitate life-long learning of skills to enhance health and growth. W作者: 鬧劇 時(shí)間: 2025-3-28 11:42
Souhwan Jung,Jaeduck Choi,Younghan Kim,Sungi Kimersity should be a university with advanced school-running idea, strong school-running strength, and high social recognition after long-term key construction. It should have a certain number of high-level disciplines leading in China and leading in the world and achieve remarkable results in the ref作者: Ovulation 時(shí)間: 2025-3-28 16:55
Alexander W. Dent I approached my coauthor Lasse Nurmi, it did not seem to be as formidable a task as it has become. Interviewing the centers in this book has taken years-to get responses, to summarize those responses, and to return the summaries for further comment. Many centers have been created in that time; othe作者: 名次后綴 時(shí)間: 2025-3-28 19:12 作者: 搬運(yùn)工 時(shí)間: 2025-3-29 02:02
Changshe Ma,Kefei Chen,Dong Zheng,Shengli Liudiversity” and “inclusion.” We see it in our vision and mission statements, and in our strategies and priorities. We undergo training to understand their meaning and attempt to adopt practices to align with the big picture. However, have we ever analyzed these terms thoroughly to appreciate why they作者: 混雜人 時(shí)間: 2025-3-29 03:51 作者: abduction 時(shí)間: 2025-3-29 10:35 作者: aneurysm 時(shí)間: 2025-3-29 11:49 作者: 間諜活動(dòng) 時(shí)間: 2025-3-29 17:41
A Privacy Preserving Rental Systemicular, users are enabled to engage in a rental service in an anonymous manner; however, users who keep overdue rental items are subject to .. Moreover, to enforce . we propose a new one-show anonymous credential scheme, tailored to the scenario of . credential issuing.作者: Cupping 時(shí)間: 2025-3-29 21:09
ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Formsnticated key agreement protocols, which use the identity information of a user as his long-term public/private key, from multilinear forms. Also, these protocols are extended to provide key confirmation.作者: 初學(xué)者 時(shí)間: 2025-3-30 02:17 作者: SOB 時(shí)間: 2025-3-30 07:25
Hybrid Signcryption Schemes with Outsider Securityl signcryption scheme is secure against outsider attacks. We also present ECISS–KEM — a simple, efficient and provably secure example of a signcryption KEM. Lastly, we briefly discuss the problems associated with using KEMs in key establishment protocols.作者: forthy 時(shí)間: 2025-3-30 11:41 作者: Aesthete 時(shí)間: 2025-3-30 12:51
Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? used, and, where this is not possible, a stream cipher would appear to be a superior choice. This raises a major question mark over the future use of CBC mode, except as part of a more complex mode designed to provide authenticated encryption.作者: kyphoplasty 時(shí)間: 2025-3-30 19:16
Chaum’s Designated Confirmer Signature Revisitedty properties of an existentially forgeable undeniable signature scheme. The existence of this cryptographic primitive is shown equivalent to the existence of public-key cryptosystems. It is also interesting to see that this article confirms the security of Chaum’s scheme since our construction is a natural generalization of this scheme.作者: Allure 時(shí)間: 2025-3-30 22:33 作者: 可互換 時(shí)間: 2025-3-31 01:07 作者: Fibrillation 時(shí)間: 2025-3-31 08:38 作者: PAD416 時(shí)間: 2025-3-31 12:07
Time-Based Release of Confidential Information in Hierarchical Settings the subsequent publication of corresponding short decryption keys, at a predetermined time, so that users can rapidly access the confidential information. This paper presents and analyzes the efficiency of a novel HTIR scheme.作者: 沒血色 時(shí)間: 2025-3-31 15:17
“Trust Engineering:” From Requirements to System Design and Maintenance – A Working National Lottery layers, and then as we move from layer to layer. We believe that such a structured approach, based on layers and trust components, can help designers of security critical applications produce demonstrably robust and verifiable systems that people will not hesitate to use.作者: TAIN 時(shí)間: 2025-3-31 20:24 作者: CREST 時(shí)間: 2025-3-31 22:32 作者: llibretto 時(shí)間: 2025-4-1 04:13
Jean Monnerat,Serge Vaudenayce a deep change in their worldview and health. A number of them have said that this was the most useful course they had taken at San Francisco State University. The materials presented here are part of a course offered by the Institute for Holistic Healing Studies. It is also a requirement for a Ho作者: 憎惡 時(shí)間: 2025-4-1 07:27
Stephen T. Chou,Angelos Stavrou,John Ioannidis,Angelos D. Keromytisce a deep change in their worldview and health. A number of them have said that this was the most useful course they had taken at San Francisco State University. The materials presented here are part of a course offered by the Institute for Holistic Healing Studies. It is also a requirement for a Ho作者: 壓倒性勝利 時(shí)間: 2025-4-1 13:40
Souhwan Jung,Jaeduck Choi,Younghan Kim,Sungi Kimable. Policy evaluation index of double first-class construction, analysis of evaluation indexes of the “Double first-class” construction discipline, policy evaluation procedure for double first-class construction, evaluation results, characteristics of double first-class construction evaluation sys