找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information and Communications Security; 9th International Co Sihan Qing,Hideki Imai,Guilin Wang Conference proceedings 2007 Springer-Verla

[復制鏈接]
樓主: sprawl
21#
發(fā)表于 2025-3-25 05:21:47 | 只看該作者
22#
發(fā)表于 2025-3-25 07:45:54 | 只看該作者
(Convertible) Undeniable Signatures Without Random Oracles were proposed in Eurocrypt 2005. The security of our scheme is based on the CDH and the decision linear assumption. Comparing only the part of undeniable signatures, our scheme uses more standard assumptions than the existing undeniable signatures without random oracles due to Laguillamie and Vergn
23#
發(fā)表于 2025-3-25 14:57:38 | 只看該作者
24#
發(fā)表于 2025-3-25 15:51:13 | 只看該作者
Preventing Unofficial Information Propagationied, or manipulated digital documents propagates the documents over the Internet and/or distributes those through physical distribution channels many challenges arise which document holders must overcome in order to mitigate the impact to their privacy or business. This paper focuses on the propagat
25#
發(fā)表于 2025-3-25 20:38:31 | 只看該作者
Privacy Protection on Multiple Sensitive Attributes about an individual, the protection of multiple sensitive attributes has become an important problem. Different from the existing models of single sensitive attribute, extra associations among multiple sensitive attributes should be invested. Two kinds of disclosure scenarios may happen because of
26#
發(fā)表于 2025-3-26 00:54:04 | 只看該作者
27#
發(fā)表于 2025-3-26 07:26:14 | 只看該作者
A Semi-blind Watermarking Based on Discrete Wavelet Transformtication. The proposed scheme employed toral automorphism to scramble the host image and the watermark so as to enhance the security and fidelity of the embedded watermark. Later, the permuted watermark and the permuted host image were transformed by discrete wavelet transform. Next, the transformed
28#
發(fā)表于 2025-3-26 08:31:18 | 只看該作者
On the Design of Fast Prefix-Preserving IP Address Anonymization Schemeerve prefix relationship after anonymization. To facilitate research on real time high speed network traffic, address anonymization algorithm should be fast and consistent. In this paper, the bit string based algorithm and the embedded bit string algorithm will be introduced. Bit string based algori
29#
發(fā)表于 2025-3-26 13:03:47 | 只看該作者
30#
發(fā)表于 2025-3-26 17:12:10 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-25 20:50
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復 返回頂部 返回列表
图木舒克市| 巴青县| 门头沟区| 蓬溪县| 长寿区| 德昌县| 祁连县| 安宁市| 枝江市| 云浮市| 邳州市| 乌审旗| 郁南县| 乌苏市| 大庆市| 蓬安县| 曲沃县| 德安县| 景泰县| 龙口市| 汉沽区| 新田县| 朝阳区| 五大连池市| 上犹县| 岳阳市| 马关县| 广河县| 阿荣旗| 丹阳市| 乐昌市| 敦煌市| 屯门区| 海淀区| 海兴县| 万荣县| 阿尔山市| 邵东县| 青州市| 峡江县| 乐清市|