找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information and Communications Security; 7th International Co Sihan Qing,Wenbo Mao,Guilin Wang Conference proceedings 2005 Springer-Verlag

[復(fù)制鏈接]
查看: 54601|回復(fù): 68
樓主
發(fā)表于 2025-3-21 18:46:34 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Information and Communications Security
副標(biāo)題7th International Co
編輯Sihan Qing,Wenbo Mao,Guilin Wang
視頻videohttp://file.papertrans.cn/466/465909/465909.mp4
叢書名稱Lecture Notes in Computer Science
圖書封面Titlebook: Information and Communications Security; 7th International Co Sihan Qing,Wenbo Mao,Guilin Wang Conference proceedings 2005 Springer-Verlag
描述The Seventh International Conference on Information and Communications - curity,ICICS2005,washeldinBeijing,China,10-13December2005. TheICICS conference series is an established forum for exchanging new research ideas and development results in the areas of information security and applied crypt- raphy. The ?rst event began here in Beijing in 1997. Since then the conference series has been interleaving its venues in China and the rest of the world: ICICS 1997 in Beijing, China; ICICS 1999 in Sydney, Australia; ICICS 2001 in Xi’an, China; ICICS 2002 in Singapore; ICICS 2003 in Hohhot City, China; and ICICS 2004 in Malaga, Spain. The conference proceedings of the past events have - ways been published by Springer in the Lecture Notes in Computer Science series, with volume numbers, respectively: LNCS 1334,LNCS 1726,LNCS 2229, LNCS 2513, LNCS 2836, and LNCS 3269. ICICS 2005 was sponsored by the Chinese Academy of Sciences (CAS); the Beijing Natural Science Foundation of China under Grant No. 4052016; the National Natural Science Foundation of China under Grants No. 60083007 and No. 60573042;the NationalGrandFundamentalResearch973ProgramofChina under Grant No. G1999035802, and Hewlett-P
出版日期Conference proceedings 2005
關(guān)鍵詞DoS attacks; Information; Signatur; access control; anonymity; communication; configuration; cryptanalysis;
版次1
doihttps://doi.org/10.1007/11602897
isbn_softcover978-3-540-30934-5
isbn_ebook978-3-540-32099-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer-Verlag Berlin Heidelberg 2005
The information of publication is updating

書目名稱Information and Communications Security影響因子(影響力)




書目名稱Information and Communications Security影響因子(影響力)學(xué)科排名




書目名稱Information and Communications Security網(wǎng)絡(luò)公開度




書目名稱Information and Communications Security網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Information and Communications Security被引頻次




書目名稱Information and Communications Security被引頻次學(xué)科排名




書目名稱Information and Communications Security年度引用




書目名稱Information and Communications Security年度引用學(xué)科排名




書目名稱Information and Communications Security讀者反饋




書目名稱Information and Communications Security讀者反饋學(xué)科排名




單選投票, 共有 1 人參與投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

1票 100.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 21:37:14 | 只看該作者
Conference proceedings 2005e series is an established forum for exchanging new research ideas and development results in the areas of information security and applied crypt- raphy. The ?rst event began here in Beijing in 1997. Since then the conference series has been interleaving its venues in China and the rest of the world
板凳
發(fā)表于 2025-3-22 02:35:21 | 只看該作者
On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol a standard intruder, and the liveness properties using an intruder that respects the resilient communication channels assumption. Finally, to provide further confidence in the protocol, several vulnerabilities on weaker versions of our protocol are exposed.
地板
發(fā)表于 2025-3-22 05:46:58 | 只看該作者
Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Securityy. The attack is so efficient that forging a valid signature needs less computation than legally generating a signature, even considering only the user side. Our result implies that the security proof of the scheme must be invalid. Furthermore we point out the fault of the proof and explain why it invalidates the proof.
5#
發(fā)表于 2025-3-22 09:46:04 | 只看該作者
Ciphertext Comparison, a New Solution to the Millionaire Problemrst solution to the millionaire problem to output a precise result (the two messages are equal or which is larger). Privacy in this new solution is achieved with an overwhelmingly large probability and strong enough in practice.
6#
發(fā)表于 2025-3-22 15:29:03 | 只看該作者
Visual Cryptographic Protocols Using the Trusted Initializerng information is only overlaying each of the transparencies over each other. Hence, it is easy for non-expert users to execute them. The visual oblivious transfer and the visual commitment scheme proposed in this paper are based on the trusted initializer model.
7#
發(fā)表于 2025-3-22 20:17:30 | 只看該作者
Session Table Architecture for Defending SYN Flood Attackgns different data structures for each other. On the base of multi-queue architecture, dynamical timeouts according to available resource improve securities of protected hosts against SYN flood attack. Experimental results show that the new architecture can work well in Gigabit Ethernet network.
8#
發(fā)表于 2025-3-22 21:23:12 | 只看該作者
9#
發(fā)表于 2025-3-23 04:56:57 | 只看該作者
10#
發(fā)表于 2025-3-23 08:23:59 | 只看該作者
Private Itemset Support Countingse a computationally efficient PISC protocol with linear communication in the size of the database. Third, we show how to further reduce the communication by using various tradeoffs and random sampling techniques.
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-5 12:56
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
常熟市| 濉溪县| 龙井市| 通道| 抚远县| 武穴市| 岳池县| 巴青县| 天台县| 永平县| 靖西县| 盐亭县| 上饶市| 吴忠市| 谢通门县| 沭阳县| 太保市| 仁怀市| 嘉禾县| 通城县| 白山市| 尖扎县| 南丰县| 霍林郭勒市| 荣昌县| 绿春县| 上虞市| 长岛县| 遵化市| 浏阳市| 长寿区| 彰武县| 克山县| 吴旗县| 武夷山市| 靖江市| 桂阳县| 休宁县| 青岛市| 丰县| 巢湖市|