作业 发表于 2025-3-21 16:31:06
书目名称Applied Cryptography in Computer and Communications影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0159758<br><br> <br><br>书目名称Applied Cryptography in Computer and Communications影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0159758<br><br> <br><br>书目名称Applied Cryptography in Computer and Communications网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0159758<br><br> <br><br>书目名称Applied Cryptography in Computer and Communications网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0159758<br><br> <br><br>书目名称Applied Cryptography in Computer and Communications被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0159758<br><br> <br><br>书目名称Applied Cryptography in Computer and Communications被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0159758<br><br> <br><br>书目名称Applied Cryptography in Computer and Communications年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0159758<br><br> <br><br>书目名称Applied Cryptography in Computer and Communications年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0159758<br><br> <br><br>书目名称Applied Cryptography in Computer and Communications读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0159758<br><br> <br><br>书目名称Applied Cryptography in Computer and Communications读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0159758<br><br> <br><br>愚蠢人 发表于 2025-3-21 22:16:32
Quantum-Safe Signing of Notification Messages in Intelligent Transport Systemsn intelligent transport systems. We evaluated the performance of the algorithms by measuring the time required to sign and verify messages, as well as the size of the signed messages, and compared the quantum-safe options to the elliptic curves currently accepted by the standards. Our results show t诱惑 发表于 2025-3-22 01:46:29
WB-GWS: An IoT-Oriented Lightweight Gateway System Based on White-Box Cryptographytions attract more and more attentions. Secure data transmission plays pivotal role of the security of IoT applications. However, there are still many IoT devices do not support cryptographic functions due to their constrained resources. Moreover, cryptographic key storage also becomes a practical s收集 发表于 2025-3-22 05:18:23
Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Envdynamic power adjustments. However, security and privacy challenges are serious issues in smart grid environment due to a myriad of heterogeneous appliances that interconnect with the grid system. Consequently, many security and privacy preservation schemes have been developed based on techniques su条约 发表于 2025-3-22 09:02:28
Resource Consumption Evaluation of C++ Cryptographic Libraries on Resource-Constrained Devicesl configuration of these resource-constrained devices. Moreover, in certain scenarios security must be guaranteed to protect data confidentiality, which imposes another resource consumption overhead. In this work-in-progress we evaluate the resource consumption of two widely-used block ciphers (AES万花筒 发表于 2025-3-22 16:18:27
http://reply.papertrans.cn/16/1598/159758/159758_6.png软弱 发表于 2025-3-22 17:42:49
bisAUTH: A Blockchain-Inspired Secure Authentication Protocol for IoT Nodess paper, our contribution consists in proposing a new authentication protocol, named bisAUTH, for IoT objects inspired on certain characteristics of the blockchain technology. Our main objective is to propose a mechanism allowing neighboring IoT nodes of a network to authenticate in a decentralizedSubstance 发表于 2025-3-22 23:27:56
http://reply.papertrans.cn/16/1598/159758/159758_8.pngexpdient 发表于 2025-3-23 04:20:40
The Block-Based Mobile PDE Systems are Not Secure - Experimental Attackstion (FDE) is often integrated in mainstream mobile operating systems like Android and iOS. FDE however cannot defend against coercive attacks in which the adversary can force the device owner to disclose the decryption key. To combat the coercive attacks, Plausibly Deniable Encryption (PDE) is leve符合规定 发表于 2025-3-23 06:18:02
Black-Box Testing of Cryptographic Algorithms Based on Data Characteristics past decades, cryptanalysts have proved that many once prevailing cryptographic algorithms (e.g., MD4, MD5, 3DES, RC4) are no longer secure now. However, insecure cryptographic algorithms are still widely deployed in practice, seriously endangering the security of cyberspace. The reasons for this d