標(biāo)題: Titlebook: Information and Communications Security; 11th International C Sihan Qing,Chris J. Mitchell,Guilin Wang Conference proceedings 2009 Springer [打印本頁(yè)] 作者: 契約 時(shí)間: 2025-3-21 16:12
書(shū)目名稱(chēng)Information and Communications Security影響因子(影響力)
書(shū)目名稱(chēng)Information and Communications Security影響因子(影響力)學(xué)科排名
書(shū)目名稱(chēng)Information and Communications Security網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱(chēng)Information and Communications Security網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱(chēng)Information and Communications Security被引頻次
書(shū)目名稱(chēng)Information and Communications Security被引頻次學(xué)科排名
書(shū)目名稱(chēng)Information and Communications Security年度引用
書(shū)目名稱(chēng)Information and Communications Security年度引用學(xué)科排名
書(shū)目名稱(chēng)Information and Communications Security讀者反饋
書(shū)目名稱(chēng)Information and Communications Security讀者反饋學(xué)科排名
作者: 農(nóng)學(xué) 時(shí)間: 2025-3-21 22:27
A User-Mode-Kernel-Mode Co-operative?Architecture for Trustable Computingd?layer?of the software stack is supposed to be able to maintain the correctness?for one in a?less privileged layer. In this work we first report evidences that this load-time code?measurement method is insufficient for maintaining the software execution correctness. We?propose a user-mode-kernel-mo作者: Slit-Lamp 時(shí)間: 2025-3-22 03:34 作者: 小母馬 時(shí)間: 2025-3-22 05:11 作者: Allure 時(shí)間: 2025-3-22 11:55 作者: neologism 時(shí)間: 2025-3-22 15:41
Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codesr and nonlinear error detection schemes were proposed. Linear codes provide protection only against primitive adversaries which no longer represents practice. On the other hand nonlinear codes provide protection against strong adversaries, but at the price of high area overhead (200–300%). Here we p作者: 喃喃而言 時(shí)間: 2025-3-22 17:11
Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded?Systemt possible from anywhere at anytime. Going along with this evolution is an increasing demand for cryptographically secure network connections with such resource-restricted devices. The Secure Sockets Layer (SSL) protocol is the current de-facto standard for secure communication over an insecure netw作者: induct 時(shí)間: 2025-3-22 23:09 作者: Antimicrobial 時(shí)間: 2025-3-23 04:44 作者: 使更活躍 時(shí)間: 2025-3-23 05:34 作者: 孵卵器 時(shí)間: 2025-3-23 11:25
A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate Pay-TV, DVD, etc. In order to discourage the legitimate subscribers from giving away their decryption keys, the traitor tracing scheme comes up. In this paper, we propose a public-key traitor tracing scheme that has optimal transmission rate. In other words, our scheme enables everyone to transmit 作者: 認(rèn)為 時(shí)間: 2025-3-23 16:34
Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor n channels. However, all the existing self-healing group key distribution schemes in the literature are designed for homogenous WSNs that do not scale. In contract, heterogeneous WSNs have better scalability and performance. We are thus motivated to study self-healing group key distribution for hete作者: CLASP 時(shí)間: 2025-3-23 21:50 作者: Paraplegia 時(shí)間: 2025-3-23 22:50 作者: GEAR 時(shí)間: 2025-3-24 06:07
Secure Remote Execution of Sequential Computationshe first contribution that addresses the security of generic sequential computations. By dividing sequential tasks into smaller subtasks and permuting them among participants, we show that our scheme facilitates the insertion of selective redundancy and/or pre-computed functions (.) that are indisti作者: 葡萄糖 時(shí)間: 2025-3-24 09:35
Architecture- and OS-Independent Binary-Level Dynamic Test Generationstatements, and of using a constraint solver to infer new program inputs from previous constraints in order to steer next executions towards new program paths. Variants of this technique have recently been adopted in finding security vulnerabilities in binary level software. However, such existing a作者: Ventricle 時(shí)間: 2025-3-24 12:26
Measuring Information Flow in Reactive Processesctive labelled transition system with input-output actions. Second, we present the language and semantics for simple reactive processes, and investigate the quantified information flow analysis over this semantics. Third, we define a metric over the semantics and then present a method to compute the作者: Exposition 時(shí)間: 2025-3-24 15:44 作者: menopause 時(shí)間: 2025-3-24 22:41 作者: Bronchial-Tubes 時(shí)間: 2025-3-25 00:19 作者: 中子 時(shí)間: 2025-3-25 03:33
Richard A. Kemmerereth usually generate non-linearity of movement transfer. Thus, it can be considered as main source of non-linearity in vibration signal. The main goal of the article is to observe how the gear backlash level influences the vibration signal and nonlinear phenomena. The signal was recorded on automobi作者: 夜晚 時(shí)間: 2025-3-25 11:19
Wenbo Maor studying the short interest rates, i.e. the Cox, Ingersoll, Ross model (.) (henceforth CIR). We propose a new approach to estimating an instantaneous short interest rate: our attention is shifted from the whole term structure of the interest rate to the artificial notation of the short rate. In pa作者: 農(nóng)學(xué) 時(shí)間: 2025-3-25 12:18
Yang Li,Kazuo Sakiyama,Shinichi Kawamura,Yuichi Komano,Kazuo Ohtar studying the short interest rates, i.e. the Cox, Ingersoll, Ross model (.) (henceforth CIR). We propose a new approach to estimating an instantaneous short interest rate: our attention is shifted from the whole term structure of the interest rate to the artificial notation of the short rate. In pa作者: deciduous 時(shí)間: 2025-3-25 16:29 作者: Traumatic-Grief 時(shí)間: 2025-3-25 21:10
Pairat Thorncharoensri,Willy Susilo,Yi Murt, Takagi, Artin and others. However, the success of this general theory has tended to obscure special facts proved by Kummer about cyclotomic fields which lie deeper than the general theory. For a long period in the 20th century this aspect of Kummer‘s work seems to have been largely forgotten, ex作者: 貪婪性 時(shí)間: 2025-3-26 03:00
Puwen Wei,Xiaoyun Wang,Yuliang Zhengrt, Takagi, Artin and others. However, the success of this general theory has tended to obscure special facts proved by Kummer about cyclotomic fields which lie deeper than the general theory. For a long period in the 20th century this aspect of Kummer‘s work seems to have been largely forgotten, ex作者: 分貝 時(shí)間: 2025-3-26 06:23
Yi-Ruei Chen,Wen-Guey Tzeng, Artin and others. However, the success of this general theory has tended to obscure special facts proved by Kummer about cyclotomic fields which lie deeper than the general theory. For a long period in the 20th century this aspect of Kummer‘s work seems to have been largely forgotten, except for a作者: 拱形大橋 時(shí)間: 2025-3-26 11:53 作者: 充足 時(shí)間: 2025-3-26 14:44 作者: 女上癮 時(shí)間: 2025-3-26 19:44
Gen Li,Kai Lu,Ying Zhang,Xicheng Lu,Wei Zhange" on cyclotomic fields is arguably the deepest and most beautiful theorem known about them. It is also the simplest example of a vast array of subsequent, unproven "main conjectures‘‘ in modern arithmetic geometry involving the arithmetic behaviour of motives over p-adic Lie extensions of number fi作者: 忙碌 時(shí)間: 2025-3-26 22:37 作者: ascetic 時(shí)間: 2025-3-27 03:32
Anbang Ruan,Qingni Shen,Liang Gu,Li Wang,Lei Shi,Yahui Yang,Zhong Chene" on cyclotomic fields is arguably the deepest and most beautiful theorem known about them. It is also the simplest example of a vast array of subsequent, unproven "main conjectures‘‘ in modern arithmetic geometry involving the arithmetic behaviour of motives over p-adic Lie extensions of number fi作者: 盤(pán)旋 時(shí)間: 2025-3-27 07:08 作者: Lamina 時(shí)間: 2025-3-27 12:40 作者: 調(diào)色板 時(shí)間: 2025-3-27 14:45
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465898.jpg作者: forebear 時(shí)間: 2025-3-27 20:30
The , Stream Cipherable design, and is particularly suitable for hardware applications with restricted resources. The . stream cipher offers 128-bit security, and aims to complement the current eSTREAM portfolio of hardware-oriented stream ciphers.作者: invert 時(shí)間: 2025-3-28 00:35
978-3-642-11144-0Springer-Verlag Berlin Heidelberg 2009作者: 原來(lái) 時(shí)間: 2025-3-28 02:09
Information and Communications Security978-3-642-11145-7Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 音樂(lè)戲劇 時(shí)間: 2025-3-28 07:00 作者: dyspareunia 時(shí)間: 2025-3-28 14:24 作者: 琺瑯 時(shí)間: 2025-3-28 14:47
Conference proceedings 2009nferenceseriesis anestablished forum that bringstogether people from universities,researchinstitutes, industry and governmentinstitutions, who work in a range of ?elds within information and communications security. The ICICS conferencesgiveattendeestheopportunitytoexchangenewideasandinvestigate dev作者: 喚醒 時(shí)間: 2025-3-28 22:15
0302-9743 e ICICS conferenceseriesis anestablished forum that bringstogether people from universities,researchinstitutes, industry and governmentinstitutions, who work in a range of ?elds within information and communications security. The ICICS conferencesgiveattendeestheopportunitytoexchangenewideasandinves作者: packet 時(shí)間: 2025-3-29 01:06 作者: bleach 時(shí)間: 2025-3-29 06:56
Public Key Encryption without Random Oracle Made Truly Practical security against adaptive chosen ciphertext attack without a random oracle. We also compare the modified Zheng-Seberry scheme with related encryption schemes in terms of efficiency and underlying assumptions, supporting our conclusion that the modified Zheng-Seberry scheme is preferable to its competitors.作者: ASSET 時(shí)間: 2025-3-29 10:57
Biometric-Based Non-transferable Anonymous Credentialstion relies on constructions for fuzzy extractors that allow one to extract and reproduce a random string from noisy biometric images. We first examine security requirements of biometric key generators, and then show how they can be integrated with anonymous credentials to achieve a high degree of non-transferability and security.作者: Mundane 時(shí)間: 2025-3-29 12:13
Measuring Information Flow in Reactive Processesd in the distance between state transformations given by a process metric. Finally, we show that there is a connection between our leakage definition and mutual information in the framework of information theory.作者: 帶傷害 時(shí)間: 2025-3-29 18:58
Trusted Isolation Environment: An Attestation Architecture with Usage Control Modeles. With its continuous and mutable feature and obligation support, we construct the TIE with flexibility. Lastly, we propose our attestation architecture with UCON. gaining the benefits of scalable and lightweight.作者: 男生戴手銬 時(shí)間: 2025-3-29 19:54
A User-Mode-Kernel-Mode Co-operative?Architecture for Trustable Computingde co-operative architecture for trustable computing in?which?a secure application?in user mode works in co-operation with the privileged system management software in kernel mode. We argue for the necessity of co-operation between a secure application and the secure service code in kernel mode,?and showcase the practicality of this method.作者: vanquish 時(shí)間: 2025-3-30 03:27 作者: Indurate 時(shí)間: 2025-3-30 06:32 作者: SYN 時(shí)間: 2025-3-30 08:14 作者: OFF 時(shí)間: 2025-3-30 15:30 作者: 小畫(huà)像 時(shí)間: 2025-3-30 19:33 作者: MOTIF 時(shí)間: 2025-3-30 20:50
Secure Remote Execution of Sequential Computationsrther investigate the damages introduced by possible chaining of errors within the remote execution and we discuss recovery mechanisms to counter these challenges. We validate our findings both analytically and empirically via simulations.作者: Afflict 時(shí)間: 2025-3-31 01:41
0302-9743 ion security and applied cryptography. Each submission to ICICS 2009 was anonymously reviewed by three or four reviewers. We are very grateful to members of the978-3-642-11144-0978-3-642-11145-7Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 同來(lái)核對(duì) 時(shí)間: 2025-3-31 07:18
Manuel Koschuch,Johann Gro?sch?dl,Dan Page,Philipp Grabher,Matthias Hudler,Michael Krüger作者: ferment 時(shí)間: 2025-3-31 09:58
Yanjiang Yang,Jianying Zhou,Robert H. Deng,Feng Bao作者: 不整齊 時(shí)間: 2025-3-31 13:46 作者: CANDY 時(shí)間: 2025-3-31 17:43
e alternative measure defined for infinitely divisible stochastic processes called the L.vy correlation cascade. As a special case, we consider symmetric .-stable CAR(1) process, also called the Ornstein-Uhlenbeck process. In order to illustrate theoretical results, we analyze the real financial dat作者: audiologist 時(shí)間: 2025-3-31 22:25 作者: 油膏 時(shí)間: 2025-4-1 03:25 作者: Freeze 時(shí)間: 2025-4-1 08:30 作者: motivate 時(shí)間: 2025-4-1 13:14
Yi-Ruei Chen,Wen-Guey Tzengse Galois group is isomorphic to the additive group of p-adic integers. Leopoldt concentrated on a fixed cyclotomic field, and established various p-adic analogues of the classical complex analytic class number formulas. In particular, this led him to introduce, with Kubota, p-adic analogues of the 作者: 扔掉掐死你 時(shí)間: 2025-4-1 15:47
Marina Blanton,William M. P. Hudelson but also from the wider arithmetic interest of these questions. The masterly exposition is intended to be accessible to both graduatestudents and non-experts in Iwasawa theory...978-3-642-06959-8978-3-540-33069-1Series ISSN 1439-7382 Series E-ISSN 2196-9922 作者: 偽書(shū) 時(shí)間: 2025-4-1 19:27