集中营 发表于 2025-3-28 17:35:01

Je mehr Kontakte, umso mehr Kontrakte,This paper shows that the scheme described in Haber and Stornetta for extending the validity of a cryptographic timestamp for a Time Stamping Service contains security shortcomings. A modification is proposed to rectify the identified shortcomings.

FORGO 发表于 2025-3-28 19:17:38

http://reply.papertrans.cn/15/1454/145314/145314_42.png

发怨言 发表于 2025-3-28 23:53:51

https://doi.org/10.1007/978-3-322-91146-9We exploit the unique features of the .-sibling Intractable hashing method in presenting two authentication schemes. In the first scheme, we propose a method which enables intermediate nodes in IP communication networks to verify the authenticity of transit flows. While in the second scheme, we introduce a new one-time digital signatures scheme.

锉屑 发表于 2025-3-29 05:01:55

http://reply.papertrans.cn/15/1454/145314/145314_44.png

PALL 发表于 2025-3-29 07:55:30

http://reply.papertrans.cn/15/1454/145314/145314_45.png

半身雕像 发表于 2025-3-29 14:49:29

IFIP Advances in Information and Communication Technologyhttp://image.papertrans.cn/a/image/145314.jpg

Fretful 发表于 2025-3-29 17:00:12

Book 2002 area of communications and multimedia security. It examines requirements, issues and solutions pertinent to securing information networks, and identifies future security-related research challenges. A wide spectrum of topics is discussed, including: .-Applied cryptography; .-Biometry; .-Communicati

冲击力 发表于 2025-3-29 22:35:01

1868-4238 nts in the area of communications and multimedia security. It examines requirements, issues and solutions pertinent to securing information networks, and identifies future security-related research challenges. A wide spectrum of topics is discussed, including: .-Applied cryptography; .-Biometry; .-C

Triglyceride 发表于 2025-3-30 00:04:12

http://reply.papertrans.cn/15/1454/145314/145314_49.png

Kindle 发表于 2025-3-30 06:42:37

http://reply.papertrans.cn/15/1454/145314/145314_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Advanced Communications and Multimedia Security; IFIP TC6 / TC11 Sixt Borka Jerman-Blažič,Tomaž Klobučar Book 2002 IFIP International Feder