派博傳思國(guó)際中心

標(biāo)題: Titlebook: Information Security; Second International Masahiro Mambo,Yuliang Zheng Conference proceedings 1999 Springer-Verlag Berlin Heidelberg 1999 [打印本頁(yè)]

作者: polysomnography    時(shí)間: 2025-3-21 17:25
書(shū)目名稱Information Security影響因子(影響力)




書(shū)目名稱Information Security影響因子(影響力)學(xué)科排名




書(shū)目名稱Information Security網(wǎng)絡(luò)公開(kāi)度




書(shū)目名稱Information Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名




書(shū)目名稱Information Security被引頻次




書(shū)目名稱Information Security被引頻次學(xué)科排名




書(shū)目名稱Information Security年度引用




書(shū)目名稱Information Security年度引用學(xué)科排名




書(shū)目名稱Information Security讀者反饋




書(shū)目名稱Information Security讀者反饋學(xué)科排名





作者: 無(wú)動(dòng)于衷    時(shí)間: 2025-3-22 00:12
Spending Programs: A Tool for Flexible Micropaymentsfor one micropayment. A more flexible mechanism is proposed in this paper, whereby coupons of variable value can be generated by a . without increasing the transaction cost. Moreover, the spending program allows one of several alternative ways of splitting the amount withdrawn into re-usable coupons to be selected in real-time.
作者: 高興去去    時(shí)間: 2025-3-22 01:07

作者: indenture    時(shí)間: 2025-3-22 07:35

作者: 正論    時(shí)間: 2025-3-22 10:25
Fingerprints for Copyright Software Protectiondentity. For these two types of identity, we introduce two different fingerprint schemes. The two schemes use digital signatures and can be easily combined and extended to be resilient against partial fingerprint destruction.
作者: 表示向下    時(shí)間: 2025-3-22 14:09
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption and provides sufficient security from the viewpoint of visibility and signal to noise ratio values. Thus the proposed method is suitable for the protection of the moving pictures with minimizing the overhead of MPEG video codec system. Also, we consider an authentication method appropriate for stream data such as MPEG video.
作者: Accolade    時(shí)間: 2025-3-22 19:25
An Improvement on a Practical Secret Voting Schemeto the counting stage; hence the voters can . once they cast their ballots. This property, realized by the introduction of distributed talliers, will be beneficial in the practical implementation of a voting scheme where less round complexity is desired.
作者: Paraplegia    時(shí)間: 2025-3-23 01:11
Security Properties of Software Componentsorm of the component. This classification could be used to determine how much the overall security of the component is dependent on the non-functional security properties of the component and to what extent the additional external protections are required in order to use the component in their specific application environment.
作者: Offset    時(shí)間: 2025-3-23 04:20
Methods for Protecting a Mobile Agent’s Routeof route information, but on the other hand allow sites to detect modifying attacks of preceding sites. Though, under noncolluding attacks, all methodes presented provide a similar level of protection, they differ w.r.t. performance and the points of time when an attack can be detected.
作者: 珊瑚    時(shí)間: 2025-3-23 09:15
Region-Based Watermarking for Imagesprocessing. This paper proposes a technique, using image region segmentation, which alleviates many of the problems associated with pre-processing and thus allowing the detection process to be more independent as well as reducing the need for human intervention.
作者: Incisor    時(shí)間: 2025-3-24 14:08

作者: glisten    時(shí)間: 2025-3-24 17:58

作者: 腐敗    時(shí)間: 2025-3-24 23:04

作者: 騙子    時(shí)間: 2025-3-25 02:13
Performance Evaluation of Certificate Revocation Using k-Valued Hash Treenication cost and a low latency for update. To solve the issues, there are many proposals including CRT (Certificate Revocation Tree), Authenticated Dictionary, and Delta List. In this paper, we study CRT using k-valued hash tree. To estimate the optimal value of k, we examine the overhead of comput
作者: 反對(duì)    時(shí)間: 2025-3-25 03:52
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus At”. However, even though proactive maintenance is employed, it is a hard problem to detect the viruses which are skillfully developed and latent in the memory of servers. We introduce a new type of virus attacks, called ., in which viruses reside in the intruded server and wait for the chance for vir
作者: 火海    時(shí)間: 2025-3-25 08:32

作者: 地名詞典    時(shí)間: 2025-3-25 14:46
Region-Based Watermarking for Imagesof creative digital data across the Internet. Several schemes, with their merits and demerits, have been proposed to date. However, many of them rely on the presentation of a test image in an appropriate format before the detection can proceed. In most cases this is achieved through some form of pre
作者: addition    時(shí)間: 2025-3-25 16:22

作者: 微不足道    時(shí)間: 2025-3-25 20:46

作者: 全部逛商店    時(shí)間: 2025-3-26 01:57
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryptionproposed algorithm is a method which combines an encryption with MPEG video compression. Furthermore, it has short processing times for the encryption and provides sufficient security from the viewpoint of visibility and signal to noise ratio values. Thus the proposed method is suitable for the prot
作者: Eructation    時(shí)間: 2025-3-26 04:55
On Anonymous Electronic Cash and Crimetem users are given anonymity which can be lifted by trustees. In an amount-limited system each user enjoys unconditional anonymity but only for payments up to a limited amount during a given time-frame. In this paper we discuss the two approaches.
作者: Figate    時(shí)間: 2025-3-26 10:34

作者: 最有利    時(shí)間: 2025-3-26 13:07

作者: CLOUT    時(shí)間: 2025-3-26 19:41

作者: Diastole    時(shí)間: 2025-3-26 21:28
Josep Domingo-Ferrer,Jordi Herrera-Joancomartíital technology and reactive materials have been gradually coming into the world of the pleasure maritime industry, implying new possibilities of experiences for users. Despite that, the yacht and vessel design debate lacks on sustainability perspective for these emerging technologies. In this scena
作者: 訓(xùn)誡    時(shí)間: 2025-3-27 02:00
Shouhuai Xu,Moti Yung,Gendu Zhang,Hong Zhuthis point, it is necessary to compare the technical scheme with the existing patented technology to determine the advanced degree of the technical scheme. The ideal level is the ratio of the useful function to the harmful function in the technical solution, which can be used to describe the current
作者: incontinence    時(shí)間: 2025-3-27 06:55

作者: blackout    時(shí)間: 2025-3-27 11:12

作者: 改良    時(shí)間: 2025-3-27 16:58

作者: 季雨    時(shí)間: 2025-3-27 21:04

作者: strain    時(shí)間: 2025-3-27 22:04
Unlinkable Electronic Coupon Protocol with Anonymity Controlates fraud and criminal acts, the electronic cash protocols should equip the revocation of the anonymity. In this paper, an electronic coupon protocol is proposed, where all payments are unlinkable but the anonymity of the payments can be revoked.
作者: 征兵    時(shí)間: 2025-3-28 03:44
Non-interactive Cryptosystem for Entity Authenticationlicable to the noninteractive zero knowledge proofs and they can provide compatible performance and safety in distributed commerce applications such as copyright protection system on multimedia contents.
作者: 協(xié)迫    時(shí)間: 2025-3-28 07:11
Implementation of Virtual Private Networks at the Transport Layer application is totally portable. Moreover, the implementation is located at the transport layer; thus, there is no need to modify any software previously installed, like FTP, Telnet, HTTP, electronic mail or other network applications.
作者: 寡頭政治    時(shí)間: 2025-3-28 14:03
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Atd, it is possible for proactive maintenance to make the system robust, while, if less than the threshold, the failure probability of the system is dependent only on the virus infection rate..In order to enhance the resilience against such virus attacks, we propose the notion of ., in which the syste
作者: 浪費(fèi)時(shí)間    時(shí)間: 2025-3-28 18:16
bility and how digitalization can support sustainable growth. To do that, the authors analyzed the existing literature for deriving common understandings of digitalization-sustainability relations. Despite the large research activity on singular concepts like digitalization, digital transformation,
作者: 掃興    時(shí)間: 2025-3-28 19:39
Josep Domingo-Ferrer,Jordi Herrera-JoancomartíS materials break down the barriers made up of a simple physical fitting through flexible immersive experiences. Their contribution to a sustainable development is both direct and indirect, by replacing or avoiding assembly processes and lightening the vessel itself. The research demonstrates how te
作者: Neuralgia    時(shí)間: 2025-3-28 23:18

作者: 希望    時(shí)間: 2025-3-29 03:06
Tim Ebringer,Peter Thornee a valid substitute for fossil-based heating systems in existing and thus less insulated buildings..Different hybrid system configurations, as well as climates and types of building have been simulated. The results have been compared in terms of PE consumption. In addition, a cost evaluation has be
作者: 巨大沒(méi)有    時(shí)間: 2025-3-29 10:30
Toru Nakanishi,Nobuaki Haruna,Yuji Sugiyama essentially independent, irreducible, thus in a sense transcendental concepts on new levels of complexity. We also stress that such a principle is not only observed empirically in biology in punctuated evolution, not only results rationally from mathematical theories of deterministic chaos and comp
作者: QUAIL    時(shí)間: 2025-3-29 13:19

作者: 調(diào)整校對(duì)    時(shí)間: 2025-3-29 17:48
Dirk Westhoff,Markus Schneider,Claus Unger,Firoz Kaderali
作者: 為現(xiàn)場(chǎng)    時(shí)間: 2025-3-29 20:14
Chun-Shien Lu,Hong-Yuan Mark Liao,Shih-Kun Huang,Chwen-Jye Sze
作者: ICLE    時(shí)間: 2025-3-30 00:35
Seungjoo Kim,Insoo Lee,Masahiro Mambo,Sungjun Park
作者: 逗留    時(shí)間: 2025-3-30 07:08
Miyako Ohkubo,Fumiaki Miura,Masayuki Abe,Atsushi Fujioka,Tatsuaki Okamoto
作者: LAVE    時(shí)間: 2025-3-30 11:13
https://doi.org/10.1007/3-540-47790-XAuthentication; Data Security; Digital Cash; Digital Payment System; Digital Signatures; Electronic Comme
作者: Armada    時(shí)間: 2025-3-30 13:25

作者: 清唱?jiǎng)?nbsp;   時(shí)間: 2025-3-30 20:12
Information Security978-3-540-47790-7Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: aggressor    時(shí)間: 2025-3-30 22:34
0302-9743 Overview: Includes supplementary material: 978-3-540-66695-0978-3-540-47790-7Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: FLING    時(shí)間: 2025-3-31 02:12
Engineering an eCash System only a single layer of a production system. We examine the feasibility of using some of these new eCash protocols in a more massive system that replaces our current physical cash system. Our examples are taken from the Australian economy, but should be applicable to other developed nations.
作者: Phagocytes    時(shí)間: 2025-3-31 06:35
On the Security of the Lee-Chang Group Signature Scheme and Its Derivativesy improved by Y.-M. Tseng and J.-K. Jan (1999) so that the resulting group signatures are unlinkable. In this paper, we show that any obvious attempt to make unlinkable the Lee-Chang signatures would likely fail. More importantly, we show that both the original Lee-Chang signature scheme and its improved version are universally forgeable.
作者: 浸軟    時(shí)間: 2025-3-31 12:05
On Anonymous Electronic Cash and Crimetem users are given anonymity which can be lifted by trustees. In an amount-limited system each user enjoys unconditional anonymity but only for payments up to a limited amount during a given time-frame. In this paper we discuss the two approaches.
作者: 新奇    時(shí)間: 2025-3-31 16:16
On the Difficulty of Key Recovery Systemsagainst criminal behavior. However, there are some disadvantages and controversies regarding the system. In this paper we review and analyze the weaknesses of several recent protocols. The protocols are examined with respect to their claimed issues.
作者: 鄙視讀作    時(shí)間: 2025-3-31 18:04
Masahiro Mambo,Yuliang ZhengIncludes supplementary material:
作者: 擴(kuò)張    時(shí)間: 2025-4-1 00:56
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465275.jpg
作者: reserve    時(shí)間: 2025-4-1 04:32
Pharmacology of Platelets, the release of thrombin is the coagulation pathway to thrombosis.. Thrombin also converts fibrinogen to fibrin, an essential element in the fixation of the platelet aggregate into a thrombus. Substances which effectively prevent the formation of the enzyme thrombin are heparin. and the coumarins.;
作者: relieve    時(shí)間: 2025-4-1 09:00

作者: 排他    時(shí)間: 2025-4-1 11:22
2730-5333 will encourage scholars to do their own analyses.Combines bu.This book showcases various methodological approaches to the analysis of organizational talk and text. Arguing that organizations are discursive constructions that are communicatively constituted, the authors use the analysis of transcript
作者: 機(jī)構(gòu)    時(shí)間: 2025-4-1 17:59
https://doi.org/10.1007/978-3-663-15731-1fy new classes of conjunctive queries with constraints that satisfy homomorphism property. For each class, we introduce a set of polynomial membership tests. Based on this, we propose an algorithm for rewriting of conjunctive queries with linear arithmetic constraints for which homomorphism property holds.
作者: nurture    時(shí)間: 2025-4-1 21:14
Die inklusive Schulelen Auswirkungen einer kapitalistischen Leistungsgesellschaft und den damit verbundenen Exklusionsprozessen auseinander. Au?erdem werden die sonderp?dagogische Inkompetenz von Regelschulkr?ften und die unzureichenden personellen Ressourcen als Negativfaktoren in der effizienten Ausgestaltung des inklusiven Unterrichts beleuchtet.
作者: incision    時(shí)間: 2025-4-2 00:48

作者: minaret    時(shí)間: 2025-4-2 06:11
Bao-Qiang Zhuang,Ya-Jun Wang of the ruling and its main similarities and divergences with other similar judgments. On the other side, given the relevance of the issues at stake, it aims at contextualizing the judgment in the wider framework of European data processing and protection debates, assuming a critical posture on the
作者: ALIBI    時(shí)間: 2025-4-2 08:14
Families, Relationships and Home LifeJones, the focus of working-class culture switched from the workplace to the home, a process which was facilitated by the advent of shorter working days (typically nine-hour days, and a half day’s holiday on Saturday)..
作者: electrolyte    時(shí)間: 2025-4-2 12:07
,Stochastic Process Algebra Model of Amyloidogenic Processing in Alzheimer’s Disease, SORLA and—secretase. This indirect interaction takes place when APP and the receptor SORLA reverses, the APP that unbinds with SORLA may be cleaved by the—secretase in the TGN. Our SPA model brought new insights about SORLA’s effect on the amyloidogenic processing, particularly to—secretase in the TGN.
作者: 鐵砧    時(shí)間: 2025-4-2 15:34

作者: 曲解    時(shí)間: 2025-4-2 21:52
of the polymer deposition kinetics and thereby aid the development of a better understanding of the interactions between the physical characteristics of a plasma and the chemistry associated with polymer formation.
作者: Communicate    時(shí)間: 2025-4-2 23:37





歡迎光臨 派博傳思國(guó)際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
太原市| 老河口市| 恩平市| 平舆县| 托克逊县| 磐安县| 社会| 双鸭山市| 白山市| 新安县| 泉州市| 潼南县| 许昌县| 太原市| 营山县| 云梦县| 依安县| 乌审旗| 晴隆县| 商河县| 南汇区| 杂多县| 惠东县| 昭苏县| 万载县| 德阳市| 平阳县| 德阳市| 丰宁| 定远县| 昌吉市| 卢龙县| 江安县| 彰化市| 合作市| 西乌| 和政县| 西安市| 安龙县| 连平县| 乌兰浩特市|