派博傳思國際中心

標(biāo)題: Titlebook: Information and Communications Security; First International Yongfei Han,Tatsuaki Okamoto,Sihan Qing Conference proceedings 1997 Springer- [打印本頁]

作者: 減輕    時(shí)間: 2025-3-21 19:27
書目名稱Information and Communications Security影響因子(影響力)




書目名稱Information and Communications Security影響因子(影響力)學(xué)科排名




書目名稱Information and Communications Security網(wǎng)絡(luò)公開度




書目名稱Information and Communications Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Information and Communications Security被引頻次




書目名稱Information and Communications Security被引頻次學(xué)科排名




書目名稱Information and Communications Security年度引用




書目名稱Information and Communications Security年度引用學(xué)科排名




書目名稱Information and Communications Security讀者反饋




書目名稱Information and Communications Security讀者反饋學(xué)科排名





作者: Antigen    時(shí)間: 2025-3-21 21:03
Mihir Bellare,Phillip Rogawaygenase enzymes.Includes chapters written by some of the pion.Since the discovery of the pharmacological and toxicological importance of inhibiting the cyclooxygenase (COX) enzymes by non-steroidal anti-inflammatory drugs (NSAIDs), much research has gone into the development of methods to study the b
作者: 染色體    時(shí)間: 2025-3-22 03:22
Giovanni di Crescenzo,Kouichi Sakurai,Moti Yungtory drugs (NSAIDs), much research has gone into the development of methods to study the biological functions of COX-1 and COX-2.? In .Cyclooxygenases: Methods and Protocols., experts and pioneers in the field present the most up-to-date in vitro and in vivo techniques routinely used in COX research
作者: 脫落    時(shí)間: 2025-3-22 07:47

作者: 機(jī)構(gòu)    時(shí)間: 2025-3-22 11:30
Yun Bai,Vijay Varadharajantory drugs (NSAIDs), much research has gone into the development of methods to study the biological functions of COX-1 and COX-2.? In .Cyclooxygenases: Methods and Protocols., experts and pioneers in the field present the most up-to-date in vitro and in vivo techniques routinely used in COX research
作者: 高腳酒杯    時(shí)間: 2025-3-22 14:05
Hung-Min Sun,Bor-Liang Chengenase enzymes.Includes chapters written by some of the pion.Since the discovery of the pharmacological and toxicological importance of inhibiting the cyclooxygenase (COX) enzymes by non-steroidal anti-inflammatory drugs (NSAIDs), much research has gone into the development of methods to study the b
作者: 主動(dòng)脈    時(shí)間: 2025-3-22 20:19
Ingrid Biehl,Susanne Wetzeltory drugs (NSAIDs), much research has gone into the development of methods to study the biological functions of COX-1 and COX-2.? In .Cyclooxygenases: Methods and Protocols., experts and pioneers in the field present the most up-to-date in vitro and in vivo techniques routinely used in COX research
作者: BROOK    時(shí)間: 2025-3-22 22:30

作者: 賭博    時(shí)間: 2025-3-23 02:49
Chris Charnes,Keith Martin,Josef Pieprzyk,Rei Safavi-Nainilgenase enzymes.Includes chapters written by some of the pion.Since the discovery of the pharmacological and toxicological importance of inhibiting the cyclooxygenase (COX) enzymes by non-steroidal anti-inflammatory drugs (NSAIDs), much research has gone into the development of methods to study the b
作者: MIR    時(shí)間: 2025-3-23 09:11
Tuomas Aura,Pekka Nikandertory drugs (NSAIDs), much research has gone into the development of methods to study the biological functions of COX-1 and COX-2.? In .Cyclooxygenases: Methods and Protocols., experts and pioneers in the field present the most up-to-date in vitro and in vivo techniques routinely used in COX research
作者: ABOUT    時(shí)間: 2025-3-23 12:03

作者: Countermand    時(shí)間: 2025-3-23 17:07
Antonio Lioy,Fabio Maino,Marco Mezzalamatory drugs (NSAIDs), much research has gone into the development of methods to study the biological functions of COX-1 and COX-2.? In .Cyclooxygenases: Methods and Protocols., experts and pioneers in the field present the most up-to-date in vitro and in vivo techniques routinely used in COX research
作者: 毗鄰    時(shí)間: 2025-3-23 21:11

作者: 法官    時(shí)間: 2025-3-23 23:08
K. M. Martin,R. Safavi-Nainitory drugs (NSAIDs), much research has gone into the development of methods to study the biological functions of COX-1 and COX-2.? In .Cyclooxygenases: Methods and Protocols., experts and pioneers in the field present the most up-to-date in vitro and in vivo techniques routinely used in COX research
作者: 疾馳    時(shí)間: 2025-3-24 05:35
Kenichi Hayashi,Eiji Okamoto,Masahiro Mambogenase enzymes.Includes chapters written by some of the pion.Since the discovery of the pharmacological and toxicological importance of inhibiting the cyclooxygenase (COX) enzymes by non-steroidal anti-inflammatory drugs (NSAIDs), much research has gone into the development of methods to study the b
作者: bronchodilator    時(shí)間: 2025-3-24 09:14

作者: Nuance    時(shí)間: 2025-3-24 12:01

作者: 飛鏢    時(shí)間: 2025-3-24 16:49
Ed Dawson,Chuan-Kun Wugenase enzymes.Includes chapters written by some of the pion.Since the discovery of the pharmacological and toxicological importance of inhibiting the cyclooxygenase (COX) enzymes by non-steroidal anti-inflammatory drugs (NSAIDs), much research has gone into the development of methods to study the b
作者: SNEER    時(shí)間: 2025-3-24 21:06

作者: BALE    時(shí)間: 2025-3-25 03:02

作者: 全部逛商店    時(shí)間: 2025-3-25 04:14

作者: 聰明    時(shí)間: 2025-3-25 07:30
Zero-knowledge proofs of decision power: New protocols and optimal round-complexity,finition of the model, and then extend the class of languages in it; (so far only the language of quadratic residuosity modulo a Blum integer was known to be applicable to this model). More precisely, we present a protocol for all known random self-reducible languages (i.e., graph isomorphism, quadr
作者: 河流    時(shí)間: 2025-3-25 15:29

作者: FIG    時(shí)間: 2025-3-25 19:39
A language for specifying sequences of authorization transformations and its applications, policy base which consisted of a finite set of facts and a finite set of access constraints. In this paper, we modify the language to consider a sequence of authorization policy transformations. The syntax and semantics of the modified authorization policy language is presented. The central issue a
作者: Affiliation    時(shí)間: 2025-3-25 21:22

作者: GULF    時(shí)間: 2025-3-26 03:51
Traceable visual cryptography,efined by Naor and Shamir [5] but is also traceable. A . out of . visual cryptography scheme is a special instance of a . out of . threshold secret sharing scheme [6]. Thus, no information about the original secret can be revealed if less than . share-holders combine their shares. In those systems i
作者: Deject    時(shí)間: 2025-3-26 07:47
Remarks on the multiple assignment secret sharing scheme,t it is proved that the proposed multiple assignment secret sharing scheme is not perfect. In fact, the non-perfectness of the scheme is due to the non-perfectness of a certain type of Shamir secret sharing scheme defined in the paper. Next, it is shown that both the extended multiple assignment sec
作者: Antecedent    時(shí)間: 2025-3-26 11:23

作者: 瑣事    時(shí)間: 2025-3-26 16:02
Design of a security platform for CORBA based application,ystem. SOAP supports CORBA security specification announced by OMG. SOAP is composed of four functional blocks which co-work with ORB to provide security services: Authentication Block, Security Association Block, Access Control Block, and Security Information Management Block. It is designed to sup
作者: 戰(zhàn)勝    時(shí)間: 2025-3-26 19:09

作者: Hyperplasia    時(shí)間: 2025-3-26 23:11

作者: BOAST    時(shí)間: 2025-3-27 05:07
Proposal of user identification scheme using mouse,e password authentication system has been frequently cracked and the handwriting authentication system needs a special device. Thus we examine whether it is possible or not to identify users by a standard device, mouse. We implement a user identification system using a mouse and experiment with it.
作者: 萬花筒    時(shí)間: 2025-3-27 07:38

作者: 贊美者    時(shí)間: 2025-3-27 10:15
Duality of Boolean functions and its cryptographic significance, high algebraic degree. However, compared with other nonlinearity criteria such propagation, resiliency, differential and linear characteristics, apparently little progress has been made in relation to algebraic degree in the context of cryptography. The aim of this work is to research into relation
作者: 鉗子    時(shí)間: 2025-3-27 14:07
Construction of correlation immune Boolean functions,egenerate Boolean function of . (. ≤ .) variables and . is a generating matrix of an [.] linear code. It is known that the correlation immunity of . (.) is at least . ? 1. In this paper we further prove when the correlation immunity exceeds this lower bound. A method which can theoretically search e
作者: GEM    時(shí)間: 2025-3-27 19:50
An improved key stream generator based on the programmable cellular automata,m generators based on the PCA and a read only memory. Cryptographic security examination of the proposed key stream generator is realized through the following two steps. As the first, an equivalent model of the generator is given, and it is shown that the generator is resistant on the known attacks
作者: Assemble    時(shí)間: 2025-3-28 01:31

作者: 令人不快    時(shí)間: 2025-3-28 05:55
https://doi.org/10.1007/BFb0028456cryptology; information security; network security; privacy; telecommunications
作者: 清唱?jiǎng)?nbsp;   時(shí)間: 2025-3-28 09:40

作者: climax    時(shí)間: 2025-3-28 11:44
Information and Communications Security978-3-540-69628-5Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: transdermal    時(shí)間: 2025-3-28 16:37
Secret sharing in hierarchical groups,We introduce the idea of hierarchical delegation within a secret sharing scheme and consider solutions with both conditional and unconditional security.
作者: Allege    時(shí)間: 2025-3-28 21:54
-code = Affine resolvable + BIBD,We say that an ..-code is optimum if it has the minimum cheating probabilities and the minimum sizes of keys. We first show that an optimum ..-code implies an affine .-resolvable design. Next, we define an affine .-resolvable + BIBD design and prove that an optimum ..-code is equivalent to an affine .-resolvable + BIBD design.
作者: fiscal    時(shí)間: 2025-3-28 23:33

作者: CORE    時(shí)間: 2025-3-29 03:53
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465895.jpg
作者: 該得    時(shí)間: 2025-3-29 08:16
Zero-knowledge proofs of decision power: New protocols and optimal round-complexity, number of rounds of zero-knowledge proofs of membership to our “decision power model”. This shows that (under some technical restrictions) our protocol is round-optimal unless the considered language is in BPP (which seems unlikely).
作者: 珠寶    時(shí)間: 2025-3-29 14:19

作者: 芳香一點(diǎn)    時(shí)間: 2025-3-29 18:33
Design of a security platform for CORBA based application,l security services which are dependent on supporting security technology will be provided as external security services for replaceability. Implementation issues such as how to simulate an interceptor mechanism using a commercial ORB product without source code, and how to extend Current object required for security services are also described.
作者: 遭受    時(shí)間: 2025-3-29 21:08
Duality of Boolean functions and its cryptographic significance,s that are related to lower bounds on nonlinearity, as well as on the number of terms, of Boolean functions. We hope that these results would stimulate the research community‘s interest in further exploring this important area.
作者: 贊成你    時(shí)間: 2025-3-30 01:37

作者: BRAWL    時(shí)間: 2025-3-30 08:05

作者: intolerance    時(shí)間: 2025-3-30 12:14
0302-9743 eld in Beijing, China in November 1997..The 37 revised full papers presented were selected from a total of 87 submissions. Also included are 11 short papers. The book is divided in sections on theoretical foundations of security, secret sharing, network security, authentication and identification, B
作者: Cholecystokinin    時(shí)間: 2025-3-30 15:49

作者: gait-cycle    時(shí)間: 2025-3-30 18:47
On the decomposition constructions for perfect secret sharing schemes,hemes for connected graphs on six vertices. In addition, we also propose some efficient decomposition constructions for perfect secret sharing schemes with access structures of constant rank. Compared with the best previous constructions, our constructions have some improved lower bounds on the information rate.
作者: Intercept    時(shí)間: 2025-3-30 22:51

作者: 媒介    時(shí)間: 2025-3-31 03:38
Stateless connections,in this way are more robust against denial of service resulting from high loads and resource exhausting attacks than their stateful counterparts. In particular, stateless authentication resists attacks that leave connections in a half-open state.
作者: 善變    時(shí)間: 2025-3-31 07:25
Multisender authentication systems with unconditional security, provide perfect protection. We give two generic constructions using secret sharing schemes and authentication codes as the underlying primitives and show that key-efficient and fast SGA-systems can be constructed by proper choice of the two primitives.
作者: Obvious    時(shí)間: 2025-3-31 12:16

作者: 染色體    時(shí)間: 2025-3-31 16:26

作者: separate    時(shí)間: 2025-3-31 18:31

作者: Repatriate    時(shí)間: 2025-3-31 22:08
Conference proceedings 1997ctions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key recovery, intellectual property protection, protocols, and electronic commerce.
作者: ANA    時(shí)間: 2025-4-1 02:23
0302-9743 oolean functions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key recovery, intellectual property protection, protocols, and electronic commerce.978-3-540-63696-0978-3-540-69628-5Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: 慢慢沖刷    時(shí)間: 2025-4-1 09:34

作者: Ibd810    時(shí)間: 2025-4-1 13:06
Yun Bai,Vijay Varadharajannd pain.? As a book in the highly successful .Methods in Molecular Biology?. series, the protocols chapters include brief introductions to their respective topics, lists of the necessary materials and reagents, step-by-step, readily reproducible laboratory protocols, and notes on troubleshooting and
作者: CRAMP    時(shí)間: 2025-4-1 14:47
Ingrid Biehl,Susanne Wetzelnd pain.? As a book in the highly successful .Methods in Molecular Biology?. series, the protocols chapters include brief introductions to their respective topics, lists of the necessary materials and reagents, step-by-step, readily reproducible laboratory protocols, and notes on troubleshooting and




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
汝南县| 永济市| 类乌齐县| 边坝县| 石嘴山市| 汾西县| 兴隆县| 榆林市| 筠连县| 大冶市| 双桥区| 团风县| 盘山县| 都江堰市| 绥阳县| 南昌市| 彰武县| 开阳县| 高平市| 广东省| 抚松县| 正阳县| 宜良县| 芜湖市| 邻水| 嘉黎县| 池州市| 颍上县| 常宁市| 永善县| 科技| 潼关县| 海盐县| 漳平市| 花垣县| 麻江县| 文化| 修文县| 平陆县| 菏泽市| 西丰县|