標(biāo)題: Titlebook: Information Security Practice and Experience; Third International Ed Dawson,Duncan S. Wong Conference proceedings 2007 Springer-Verlag Ber [打印本頁(yè)] 作者: polysomnography 時(shí)間: 2025-3-21 18:03
書(shū)目名稱Information Security Practice and Experience影響因子(影響力)
書(shū)目名稱Information Security Practice and Experience影響因子(影響力)學(xué)科排名
書(shū)目名稱Information Security Practice and Experience網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Information Security Practice and Experience網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Information Security Practice and Experience被引頻次
書(shū)目名稱Information Security Practice and Experience被引頻次學(xué)科排名
書(shū)目名稱Information Security Practice and Experience年度引用
書(shū)目名稱Information Security Practice and Experience年度引用學(xué)科排名
書(shū)目名稱Information Security Practice and Experience讀者反饋
書(shū)目名稱Information Security Practice and Experience讀者反饋學(xué)科排名
作者: nullify 時(shí)間: 2025-3-21 21:46
Zheng-lin Liu,Xu Guo,Yi-cheng Chen,Yu Han,Xue-cheng Zou anyone who has undertaken research or study relating to the protection of cultural heritage discovers one of the frustrations encountered is the absence of ready access to the multi- various international instruments which exist in the field. Since the end of the Second World War these instruments 作者: Carminative 時(shí)間: 2025-3-22 03:15
Man Ho Au,Joseph K. Liu,Willy Susilo,Tsz Hon Yuen anyone who has undertaken research or study relating to the protection of cultural heritage discovers one of the frustrations encountered is the absence of ready access to the multi- various international instruments which exist in the field. Since the end of the Second World War these instruments 作者: cognizant 時(shí)間: 2025-3-22 05:25 作者: obviate 時(shí)間: 2025-3-22 09:54
Peter C. S. Kwan,Glenn Durfeethe most problematic behaviour, which may be seen as ‘a(chǎn)nti-social’ or is clearly ‘criminal’ (in the sense that it breaks the law). For criminologists (and criminal justice agencies), schools are often the site on which data are collected from young people (see, for example, Smith and McVie, 2003; MO作者: 藕床生厭倦 時(shí)間: 2025-3-22 16:07
Jung Hwa Chae,Nematollaah Shirithe most problematic behaviour, which may be seen as ‘a(chǎn)nti-social’ or is clearly ‘criminal’ (in the sense that it breaks the law). For criminologists (and criminal justice agencies), schools are often the site on which data are collected from young people (see, for example, Smith and McVie, 2003; MO作者: 怎樣才咆哮 時(shí)間: 2025-3-22 18:05
Yanjiang Yang,Robert H. Deng,Feng Baoasses and that they are examples of how the working class once attempted to bolster a sense of stability and community, during the transitional years of the early nineteenth century, by effectively representing both a consolidation and celebration of their core values and beliefs.?978-1-137-59789-2作者: circuit 時(shí)間: 2025-3-22 22:45
Chunhua Su,Jianying Zhou,Feng Bao,Tsuyoshi Takagi,Kouichi Sakuraiasses and that they are examples of how the working class once attempted to bolster a sense of stability and community, during the transitional years of the early nineteenth century, by effectively representing both a consolidation and celebration of their core values and beliefs.?978-1-137-59789-2作者: defenses 時(shí)間: 2025-3-23 03:17 作者: 冷淡周邊 時(shí)間: 2025-3-23 08:41 作者: 步兵 時(shí)間: 2025-3-23 17:07 作者: Ventilator 時(shí)間: 2025-3-23 20:22 作者: FRONT 時(shí)間: 2025-3-24 00:20
ns encountered is the absence of ready access to the multi- various international instruments which exist in the field. Since the end of the Second World War these instruments 978-1-4899-9166-9978-1-4419-7946-9作者: 極少 時(shí)間: 2025-3-24 05:30 作者: Arteriography 時(shí)間: 2025-3-24 10:36
Jorge Nakahara Jr.ns encountered is the absence of ready access to the multi- various international instruments which exist in the field. Since the end of the Second World War these instruments 978-1-4899-9166-9978-1-4419-7946-9作者: 詢問(wèn) 時(shí)間: 2025-3-24 14:26
Gaoli Wangns encountered is the absence of ready access to the multi- various international instruments which exist in the field. Since the end of the Second World War these instruments 978-1-4899-9166-9978-1-4419-7946-9作者: reserve 時(shí)間: 2025-3-24 17:45
Tetsuya Izu,Noboru Kunihiro,Kazuo Ohta,Masahiko Takenaka,Takashi Yoshiokans encountered is the absence of ready access to the multi- various international instruments which exist in the field. Since the end of the Second World War these instruments 978-1-4899-9166-9978-1-4419-7946-9作者: 容易做 時(shí)間: 2025-3-24 23:03
Jianhong Zhang,Jian Maons encountered is the absence of ready access to the multi- various international instruments which exist in the field. Since the end of the Second World War these instruments 978-1-4899-9166-9978-1-4419-7946-9作者: anchor 時(shí)間: 2025-3-25 03:04 作者: 楓樹(shù) 時(shí)間: 2025-3-25 06:08
Zhen Cao,Zhi Guan,Zhong Chen,Jianbin Hu,Liyong Tang作者: NAV 時(shí)間: 2025-3-25 10:19 作者: 行業(yè) 時(shí)間: 2025-3-25 11:39
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocolsence. The proposed model can help the common users to have a better knowledge of the protocols they are using, and in the meantime help designers to examine their designs and get clues to improve them. We validate the applicability and effectiveness of our risk evaluation model by applying it to ana作者: 堅(jiān)毅 時(shí)間: 2025-3-25 19:29 作者: PLAYS 時(shí)間: 2025-3-25 22:47
Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction main stream in homomorphic auction schemes as they employ threshold secret sharing techniques to seal the bids. Main stream homomorphic auction schemes employ a homomorphic encryption algorithm with threshold distributed decryption to seal the bids as it is simpler and more efficient than secret sh作者: 疲勞 時(shí)間: 2025-3-26 03:38 作者: REP 時(shí)間: 2025-3-26 06:58 作者: Narcissist 時(shí)間: 2025-3-26 11:51 作者: 泰然自若 時(shí)間: 2025-3-26 16:25
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465313.jpg作者: Circumscribe 時(shí)間: 2025-3-26 20:03
https://doi.org/10.1007/978-3-540-72163-5AES; DOM; Denial of Service; Error-correcting Code; Information; Oracle; access control; cryptographic hard作者: Innovative 時(shí)間: 2025-3-26 23:51
A Sanitizable Signature Scheme with Aggregation on a sanitizable signature proposed by Izu et al, by applying the general aggregate signature by Boneh et al. We also propose some efficiency improvements on the proposed scheme by reducing the number of hash values required as verifiers’ input.作者: Aura231 時(shí)間: 2025-3-27 01:55 作者: 價(jià)值在貶值 時(shí)間: 2025-3-27 07:01 作者: Bureaucracy 時(shí)間: 2025-3-27 10:11
A Novel Verifiably Encrypted Signature Scheme Without Random Oracleeme has the following advantages: (1) short signature size, only 320 bits; (2)low computation, only 2 pairing operations are needed in the phase of producing and verifying verifiably encrypted signature, respectively. (3)simplification-ability, the creation of verifiably encrypted signature is able to be completed in a logic step.作者: chandel 時(shí)間: 2025-3-27 16:54 作者: 違抗 時(shí)間: 2025-3-27 19:48
Formalization of RBAC Policy with Object Class Hierarchyity to model object classes, and class hierarchies used to restrict the validity and to control the propagation of authorization rules. We also demonstrate how access control decisions are made by tableaux, considering role and class hierarchies.作者: 開(kāi)始發(fā)作 時(shí)間: 2025-3-28 00:39
Two-Party Privacy-Preserving Agglomerative Document Clustering document clustering among the users under the distributed environment: two parties, each having his private documents, want to collaboratively execute agglomerative document clustering without disclosing their private contents.作者: 充氣女 時(shí)間: 2025-3-28 03:04
How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication – Ring Extension he definition field of an elliptic curve to its random extension ring and performing the required elliptic curve operations over the ring. Moreover, new methods perform a point validation check in a small subring of the extension ring to give an efficient fault attack countermeasure.作者: 和諧 時(shí)間: 2025-3-28 08:58
Related-Key Rectangle Attack on 43-Round SHACAL-2 a related-key rectangle attack on the 42-round SHACAL-2 [13]. In this paper we present a related-key rectangle attack on 43-round out of the 64-round of SHACAL-2, which requires 2. chosen plaintexts and has time complexity of 2. 43-round SHACAL-2 encryptions. In this paper we also identify and fix some flaws in previous attack on SHACAL-2.作者: plasma-cells 時(shí)間: 2025-3-28 12:59 作者: 鋼筆記下懲罰 時(shí)間: 2025-3-28 16:21 作者: 放肆的你 時(shí)間: 2025-3-28 21:56 作者: Cocker 時(shí)間: 2025-3-29 00:23
0302-9743 7. The conference was organized and sponsored by City University of Hong Kong. As applications of information security technologies become pervasive, - sues pertaining to their deployment and operation are becoming increasingly important. ISPEC is an annual conference that brings together researcher作者: Inflated 時(shí)間: 2025-3-29 06:01
Application Security – Myth Or Reality?rom global Internet connection are rapidly rising, there is a need to reconsider security schemes at the application level. This paper examines current trends in application design, development, deployment and management and evaluates these against known system vulnerabilities and threats.作者: affluent 時(shí)間: 2025-3-29 09:03 作者: browbeat 時(shí)間: 2025-3-29 13:14
Secure Signed Radix-, Recoding Methods for Constrained-Embedded Devicesous methods which require .-digit (bit) of RAM additional memory to store the recoded scalar. Consequently, thanks to its left-to-right nature, the scalar multiplication based on it is by far more convenient with respect to memory consumption.作者: gusher 時(shí)間: 2025-3-29 15:39
Application Security – Myth Or Reality?rmation system assurance in an era where ICT governance and compliance have taken on new force and the use of commodity level ICT products for critical information systems continues. While it has been argued that an application can be no more secure than its underlying computer sub-systems, security作者: Palpate 時(shí)間: 2025-3-29 23:00 作者: Critical 時(shí)間: 2025-3-30 00:59
A Linear Analysis of Blowfish and Khufu89). The nonlinear cipher components of these ciphers are ., and thus, unknown to unauthorized entities. Nonetheless, we estimate the fraction of user keys that generate weak nonlinear components (namely, with large enough bias). As far as we are aware of this paper reports the first known-plaintext作者: jarring 時(shí)間: 2025-3-30 07:44 作者: 機(jī)械 時(shí)間: 2025-3-30 08:49 作者: 發(fā)誓放棄 時(shí)間: 2025-3-30 13:35 作者: 吼叫 時(shí)間: 2025-3-30 18:33
A Novel Verifiably Encrypted Signature Scheme Without Random Oraclepropose a novel verifiably encrypted signature scheme without random oracles, and show that the security of the scheme is based on the difficulty of solving the Chosen-Target-Inverse-CDH with square problem. By comparing our scheme with Boneh . scheme and S.Lu . scheme, we show that our proposed sch作者: Diskectomy 時(shí)間: 2025-3-30 21:55 作者: 感情脆弱 時(shí)間: 2025-3-31 02:12 作者: LASH 時(shí)間: 2025-3-31 08:55
On the Sequentiality of Three Optimal Structured Multisignature Schemesce with a specified signing order. In this paper, we find that three optimal structured multisignature schemes cannot keep sequentiality since they cannot prevent partial signers producing a valid partial multisignature in a signing order different from the specified one. Hence, verifies cannot iden作者: –FER 時(shí)間: 2025-3-31 10:45
Secure Feedback Service in Wireless Sensor Networksands). One straightforward way to do so is to let every sensor node send an authenticated acknowledgement (ACK) to the BS directly. However this naive solution is highly communication inefficient and may result in severe ACK implosion near the BS. In this paper, we propose a communication efficient 作者: liaison 時(shí)間: 2025-3-31 14:21 作者: 玉米 時(shí)間: 2025-3-31 18:23
Practical Uses of Virtual Machines for Protection of Sensitive User Data the systems. This paper presents Vault - a system that uses a trusted software component to prevent the exposure and abuse of sensitive user data in the presence of malware. Users input and store their sensitive data only in the trusted component, which is separated from the commodity system by a v作者: molest 時(shí)間: 2025-4-1 00:21 作者: 易發(fā)怒 時(shí)間: 2025-4-1 05:10 作者: Evocative 時(shí)間: 2025-4-1 10:03 作者: CAB 時(shí)間: 2025-4-1 13:44
Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auctionmployed to open the bids. Such e-auction schemes are called homomorphic auctions. However, high efficiency of homomorphic auctions is based on an assumption: the bids are valid (e.g. within a special range). An undetected invalid bid can compromise correctness and fairness of the auction. Unfortunat作者: 不持續(xù)就爆 時(shí)間: 2025-4-1 14:27 作者: ANIM 時(shí)間: 2025-4-1 21:25
Secure Signed Radix-, Recoding Methods for Constrained-Embedded Deviceso-right so they can be interleaved with a left-to-right scalar multiplication, removing the need to store both a scalar and its recoding. Next, we show the ideas of left-to-right recoding for a radix-. representation lead to simplified recoding methods for a binary representation. In general our pro作者: 精致 時(shí)間: 2025-4-2 01:44
s supplementary material: .The theft, trafficking, and falsification of cultural property and cultural heritage objects?are crimes of a particularly complex nature,?which often have international ramifications and significant economic consequences. Organized criminal groups of various types and orig作者: Debrief 時(shí)間: 2025-4-2 05:25