標(biāo)題: Titlebook: Information Security and Cryptology; Third SKLOIS Confere Dingyi Pei,Moti Yung,Chuankun Wu Conference proceedings 2008 Springer-Verlag Berl [打印本頁] 作者: 短暫 時間: 2025-3-21 17:50
書目名稱Information Security and Cryptology影響因子(影響力)
書目名稱Information Security and Cryptology影響因子(影響力)學(xué)科排名
書目名稱Information Security and Cryptology網(wǎng)絡(luò)公開度
書目名稱Information Security and Cryptology網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Information Security and Cryptology被引頻次
書目名稱Information Security and Cryptology被引頻次學(xué)科排名
書目名稱Information Security and Cryptology年度引用
書目名稱Information Security and Cryptology年度引用學(xué)科排名
書目名稱Information Security and Cryptology讀者反饋
書目名稱Information Security and Cryptology讀者反饋學(xué)科排名
作者: cloture 時間: 2025-3-21 20:37
Vivien Dubois,Pierre-Alain Fouque,Adi Shamir,Jacques Sternn boils down to an assessment of whether a decentralized, distributed system like the blockchain better meets the integrity requirements of a modern payments infrastructure and is more suitable to mitigate the root cause of cyber incidents, which is human error.作者: 眨眼 時間: 2025-3-22 01:33
Raylin Tso,Takeshi Okamoto,Eiji Okamotog that the proposed scheme is compared with. Furthermore, the mechanism under consideration provides smooth and seamless load restoration, preventing oscillations between shedding and restoration. It is robust to functional approximation errors, measurement noise and sudden load disturbances.作者: 缺陷 時間: 2025-3-22 07:31
Wei Wu,Yi Mu,Willy Susilo,Xinyi Huang public concerns. Consequently during risk analysis, different perspectives need to be considered. This article reports on an extensive analysis of risk management frameworks, which resulted in a framework specifically targeted at smart grid and smart metering systems. Perspective of risk analysis i作者: 討人喜歡 時間: 2025-3-22 09:55 作者: 殺子女者 時間: 2025-3-22 13:43 作者: 逃避責(zé)任 時間: 2025-3-22 19:26 作者: 哥哥噴涌而出 時間: 2025-3-22 22:39 作者: 樂器演奏者 時間: 2025-3-23 01:53 作者: oblique 時間: 2025-3-23 09:20 作者: 多嘴多舌 時間: 2025-3-23 11:59
Yi Deng,Dongdai Linate of their water management installations and processes. In this paper we present our benchmark approach to the security of ICS. Moreover, we discuss the major results of the benchmark as well as a cyber security simulator that was developed to raise awareness and develop further knowledge on the 作者: AFFIX 時間: 2025-3-23 14:33
Marc Mouffron,Frederic Rousseau,Huafei Zhurformance and the underlying PNet, and dynamically adapt the P2P overlay and migrate over the PNet in order to optimize communications according to the requirements of the federation and the current conditions of the PNet. Reliable communications is provided via redundancy within the communication m作者: 中子 時間: 2025-3-23 20:11
Ning Ding,Dawu Gurformance and the underlying PNet, and dynamically adapt the P2P overlay and migrate over the PNet in order to optimize communications according to the requirements of the federation and the current conditions of the PNet. Reliable communications is provided via redundancy within the communication m作者: 敲竹杠 時間: 2025-3-23 23:57
Christophe Tartary,Josef Pieprzyk,Huaxiong Wangrformance and the underlying PNet, and dynamically adapt the P2P overlay and migrate over the PNet in order to optimize communications according to the requirements of the federation and the current conditions of the PNet. Reliable communications is provided via redundancy within the communication m作者: 裁決 時間: 2025-3-24 04:55 作者: anus928 時間: 2025-3-24 09:26 作者: Gene408 時間: 2025-3-24 11:17 作者: Gerontology 時間: 2025-3-24 15:46 作者: 昏暗 時間: 2025-3-24 19:47 作者: cumulative 時間: 2025-3-25 00:54
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465364.jpg作者: 疲勞 時間: 2025-3-25 05:37 作者: 作嘔 時間: 2025-3-25 08:05 作者: 消息靈通 時間: 2025-3-25 12:10 作者: 不法行為 時間: 2025-3-25 19:43
An Efficient ID-Based Proxy Signature Scheme from Pairingsprocedure of our scheme is only one, so our scheme is more efficient comparatively. The new scheme can be proved secure with the hardness assumption of the .-Bilinear Diffie-Hellman Inverse problem, in the random oracle model.作者: 含糊其辭 時間: 2025-3-25 22:12 作者: 放肆的我 時間: 2025-3-26 01:50
Four Families of Binary Sequences with Low Correlation and Large Linear Complexityr odd ., and .., .. for even .. The family .. has six-valued correlations, while .. and .. have either six-valued correlations or eight-valued correlations, and .. has either eight-valued or ten-valued, depending on the choice of parameters.作者: LAVE 時間: 2025-3-26 06:15 作者: BOON 時間: 2025-3-26 11:25
Conference proceedings 2008ce on Information Security and Cryptology, Inscrypt 2007 (formerly CISC), held in Xining, China, in August/September 2007...The 33 revised full papers and 10 revised short papers presented together with 2 invited papers were carefully reviewed and selected from 167 submissions. The papers are organi作者: PALSY 時間: 2025-3-26 15:12 作者: 使人煩燥 時間: 2025-3-26 19:56 作者: APO 時間: 2025-3-26 23:42 作者: Gesture 時間: 2025-3-27 02:01
A Provably Secure One-Pass Two-Party Key Establishment Protocolf our knowledge, ours is the only one-pass protocol that resists general key-compromise impersonation attacks, and avoids certain vulnerabilities to loss of information attacks found in other protocols of its class.作者: 摘要 時間: 2025-3-27 08:22 作者: Capture 時間: 2025-3-27 12:21
Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacksesistant to algebraic attacks. As a demonstration of the weakness inherent in the presence of a regularly clocked shift register, we present a simple algebraic attack on Alpha 1 based on only 29 keystream bits.作者: 起草 時間: 2025-3-27 13:55
0302-9743 ) Conference on Information Security and Cryptology, Inscrypt 2007 (formerly CISC), held in Xining, China, in August/September 2007...The 33 revised full papers and 10 revised short papers presented together with 2 invited papers were carefully reviewed and selected from 167 submissions. The papers 作者: certitude 時間: 2025-3-27 18:05
Conference proceedings 2008tream cipher and pseudorandomness, boolean functions, privacy and deniability, hash functions, public key cryptosystems, public key analysis, application security, system security and trusted computing, and network security..作者: aspersion 時間: 2025-3-27 22:41 作者: Fissure 時間: 2025-3-28 03:45 作者: faction 時間: 2025-3-28 08:02
Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversariesion to what it can do in an ideal scenario. We show that the proposed scheme is provably secure against malicious adversary assuming that the underlying homomorphic commitment is statistically hiding and computationally binding and the homomorphic encryption scheme is semantically secure in the common reference string model.作者: Clumsy 時間: 2025-3-28 12:58
Cryptanalysis of the SFLASH Signature Schemet smart cards [5]. In this abstract, we present new attacks on the general design proposed by Patarin?. [8] which allows to forge signatures in a few minutes for practical instantiations including the SFLASH scheme recommended by NESSIE [5].作者: FADE 時間: 2025-3-28 16:31
A Key Predistribution Scheme Based on 3-Designs a key predistribution scheme for distributed sensor networks. The secure connectivity and resilience of the resulting sensor network will be analyzed in this paper. This KPS constructed in our paper has some better properties than the ones of KPSs constructed in [5],[7] and [9].作者: adequate-intake 時間: 2025-3-28 18:55
Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assu BPK model without assuming .. In our protocol, the resettable zero knowledge is demonstrated via a black-box simulator, while the concurrent soundness is proved by using the malicious prover strategy in . manner.作者: ADORN 時間: 2025-3-29 01:32
Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks implemented by collaboration of . nodes(including at least .. server nodes). Key share distribution, key reconstruction, key share refreshing and recovery are discussed in this paper. The presented protocols improve the availability and enhance the security compared with the existing partially and fully distributed schemes respectively.作者: 音樂學(xué)者 時間: 2025-3-29 06:33 作者: 引起痛苦 時間: 2025-3-29 07:59 作者: agonist 時間: 2025-3-29 12:07 作者: Magnitude 時間: 2025-3-29 15:37 作者: WITH 時間: 2025-3-29 19:45 作者: 影響 時間: 2025-3-30 00:27
Raylin Tso,Takeshi Okamoto,Eiji Okamototric frequency declines from its nominal value. This is a highly unwanted situation that limits machine and other power system auxiliaries life time. Contemporary power systems employ conventional load shedding practices as a last resort, in order to achieve frequency stability. However, these pract作者: Axillary 時間: 2025-3-30 05:36
Wei Wu,Yi Mu,Willy Susilo,Xinyi Huangant new risk to the energy sector that were not present in the power grids that operated in isolation. The data that is generated in the smart metering systems can possibly harm its stakeholders. Hence it is important to protect all the stakeholders by providing effective controls to the vulnerable 作者: yohimbine 時間: 2025-3-30 08:12
Chunxiang Gu,Yuefei Zhuios can be used to accelerate system development in different phases including requirements engineering, functional testing and system validation. Developing scenarios, in particular cross-border scenarios, is however a time-consuming task requiring a significant amount of contributions from end-use作者: abysmal 時間: 2025-3-30 14:26
B. Collard,F. -X. Standaert,J. -J. Quisquaterios can be used to accelerate system development in different phases including requirements engineering, functional testing and system validation. Developing scenarios, in particular cross-border scenarios, is however a time-consuming task requiring a significant amount of contributions from end-use作者: Ebct207 時間: 2025-3-30 20:28
Andrey Bogdanovios can be used to accelerate system development in different phases including requirements engineering, functional testing and system validation. Developing scenarios, in particular cross-border scenarios, is however a time-consuming task requiring a significant amount of contributions from end-use作者: 身心疲憊 時間: 2025-3-30 23:13
Junwu Dong,Dingyi Pei,Xueli Wangios can be used to accelerate system development in different phases including requirements engineering, functional testing and system validation. Developing scenarios, in particular cross-border scenarios, is however a time-consuming task requiring a significant amount of contributions from end-use作者: 排斥 時間: 2025-3-31 01:44
Weijia Wang,Lei Hu,Yong Liios can be used to accelerate system development in different phases including requirements engineering, functional testing and system validation. Developing scenarios, in particular cross-border scenarios, is however a time-consuming task requiring a significant amount of contributions from end-use作者: exigent 時間: 2025-3-31 07:22
K. Chalkias,S. T. Halkidis,D. Hristu-Varsakelis,G. Stephanides,A. Alexiadisios can be used to accelerate system development in different phases including requirements engineering, functional testing and system validation. Developing scenarios, in particular cross-border scenarios, is however a time-consuming task requiring a significant amount of contributions from end-use作者: inflame 時間: 2025-3-31 11:29 作者: 賭博 時間: 2025-3-31 14:31 作者: Cumulus 時間: 2025-3-31 19:58
Ning Ding,Dawu Guese diverse simulators must then be coordinated to run concurrently in order to evaluate the performance of critical infrastructures which influence each other, especially in emergency or resource-critical situations. We therefore describe the design of an adaptive communication middleware that prov作者: 五行打油詩 時間: 2025-3-31 22:46 作者: antenna 時間: 2025-4-1 03:09