找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Security Theory and Practice; 12th IFIP WG 11.2 In Olivier Blazy,Chan Yeob Yeun Conference proceedings 2019 IFIP International

[復(fù)制鏈接]
查看: 54546|回復(fù): 53
樓主
發(fā)表于 2025-3-21 17:31:45 | 只看該作者 |倒序瀏覽 |閱讀模式
書目名稱Information Security Theory and Practice
副標(biāo)題12th IFIP WG 11.2 In
編輯Olivier Blazy,Chan Yeob Yeun
視頻videohttp://file.papertrans.cn/466/465342/465342.mp4
叢書名稱Lecture Notes in Computer Science
圖書封面Titlebook: Information Security Theory and Practice; 12th IFIP WG 11.2 In Olivier Blazy,Chan Yeob Yeun Conference proceedings 2019 IFIP International
描述.This volume constitutes the refereed proceedings of the 12th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2018, held in Brussels, Belgium, in December 2018...The 13 revised full papers and 2 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: real world; cryptography; artificial learning; cybersecurity; and Internet of things..
出版日期Conference proceedings 2019
關(guān)鍵詞access control; artificial intelligence; authentication; automotive security; classification; computer ne
版次1
doihttps://doi.org/10.1007/978-3-030-20074-9
isbn_softcover978-3-030-20073-2
isbn_ebook978-3-030-20074-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightIFIP International Federation for Information Processing 2019
The information of publication is updating

書目名稱Information Security Theory and Practice影響因子(影響力)




書目名稱Information Security Theory and Practice影響因子(影響力)學(xué)科排名




書目名稱Information Security Theory and Practice網(wǎng)絡(luò)公開度




書目名稱Information Security Theory and Practice網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Information Security Theory and Practice被引頻次




書目名稱Information Security Theory and Practice被引頻次學(xué)科排名




書目名稱Information Security Theory and Practice年度引用




書目名稱Information Security Theory and Practice年度引用學(xué)科排名




書目名稱Information Security Theory and Practice讀者反饋




書目名稱Information Security Theory and Practice讀者反饋學(xué)科排名




單選投票, 共有 1 人參與投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

0票 0.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

1票 100.00%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 21:08:51 | 只看該作者
Secure Outsourcing in Discrete-Logarithm-Based and Pairing-Based Cryptography (Invited Talk)ally computing (including the secret inputs and outputs). We briefly review the recent advances on secure outsourcing of group exponentiation (in groups of known prime order as well as in groups of unknown order) and pairing computation.
板凳
發(fā)表于 2025-3-22 03:00:04 | 只看該作者
Remote Credential Management with Mutual Attestation for Trusted Execution Environmentsn this work, we present novel protocols using mutual attestation for supporting four aspects of secure remote credential management with TEEs: ., ., ., and .. The proposed protocols are agnostic to the underlying TEE implementation and subjected to formal verification using Scyther, which found no attacks.
地板
發(fā)表于 2025-3-22 08:38:48 | 只看該作者
Generating a Real-Time Constraint Engine for Network Protocolschanisms to generate the constraint engine code. Comparing the autogenerated version against a manually implemented, optimized version of the constraint engine indicates no significant difference in terms of their performance.
5#
發(fā)表于 2025-3-22 10:35:34 | 只看該作者
On the Non-repudiation of Isogeny Based Signature Scheme signature which threaten the non-repudiation of GPS signature. We also suggest how to prevent key substitution attack in general as well as our attack in this paper. We also present an example of our attack using Sage to illustrate isogenies of elliptic curves and our attack.
6#
發(fā)表于 2025-3-22 13:45:28 | 只看該作者
7#
發(fā)表于 2025-3-22 17:54:47 | 只看該作者
Conference proceedings 2019P 2018, held in Brussels, Belgium, in December 2018...The 13 revised full papers and 2 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: real world; cryptography; artificial learning; cybersecurity; and Intern
8#
發(fā)表于 2025-3-22 21:21:26 | 只看該作者
9#
發(fā)表于 2025-3-23 05:05:44 | 只看該作者
10#
發(fā)表于 2025-3-23 07:19:14 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-21 19:59
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
威海市| 科技| 云和县| 明溪县| 肥西县| 公主岭市| 墨竹工卡县| 汕头市| 葫芦岛市| 邯郸市| 正蓝旗| 安宁市| 新郑市| 上饶县| 玛沁县| 惠州市| 宁河县| 济源市| 迁安市| 新邵县| 山阴县| 固安县| 屏南县| 奉节县| 尤溪县| 玉树县| 湘西| 佛山市| 南澳县| 大埔县| 贞丰县| 馆陶县| 西安市| 冕宁县| 华宁县| 温宿县| 金华市| 湖南省| 乐至县| 平泉县| 会东县|