ossicles 发表于 2025-3-21 16:28:48
书目名称Blockchain Technology and Emerging Applications影响因子(影响力)<br> http://impactfactor.cn/if/?ISSN=BK0189203<br><br> <br><br>书目名称Blockchain Technology and Emerging Applications影响因子(影响力)学科排名<br> http://impactfactor.cn/ifr/?ISSN=BK0189203<br><br> <br><br>书目名称Blockchain Technology and Emerging Applications网络公开度<br> http://impactfactor.cn/at/?ISSN=BK0189203<br><br> <br><br>书目名称Blockchain Technology and Emerging Applications网络公开度学科排名<br> http://impactfactor.cn/atr/?ISSN=BK0189203<br><br> <br><br>书目名称Blockchain Technology and Emerging Applications被引频次<br> http://impactfactor.cn/tc/?ISSN=BK0189203<br><br> <br><br>书目名称Blockchain Technology and Emerging Applications被引频次学科排名<br> http://impactfactor.cn/tcr/?ISSN=BK0189203<br><br> <br><br>书目名称Blockchain Technology and Emerging Applications年度引用<br> http://impactfactor.cn/ii/?ISSN=BK0189203<br><br> <br><br>书目名称Blockchain Technology and Emerging Applications年度引用学科排名<br> http://impactfactor.cn/iir/?ISSN=BK0189203<br><br> <br><br>书目名称Blockchain Technology and Emerging Applications读者反馈<br> http://impactfactor.cn/5y/?ISSN=BK0189203<br><br> <br><br>书目名称Blockchain Technology and Emerging Applications读者反馈学科排名<br> http://impactfactor.cn/5yr/?ISSN=BK0189203<br><br> <br><br>联合 发表于 2025-3-21 22:32:36
Letters with continuation sheets, DRSA monitors the execution of the checksum function using the debug registers and erases itself before the next attestation. Our evaluation demonstrates that DRSA incurs low overhead, and it is extremely difficult for the verifier to detect it.蒸发 发表于 2025-3-22 03:36:22
http://reply.papertrans.cn/19/1893/189203/189203_3.pngspinal-stenosis 发表于 2025-3-22 05:38:28
Wanja Wellbrock,Daniela Ludin,Irena Knezevic. At the same time, verifiability enables the shared user to verify that the re-encrypted ciphertext returned by the server is correct. In addition, the introduction of a decentralized Blockchain provides distributed storage and it is tamper-proof for enhancing the trustworthiness of the connected v关心 发表于 2025-3-22 12:38:27
http://reply.papertrans.cn/19/1893/189203/189203_5.png成份 发表于 2025-3-22 14:23:57
Identity-Based Key Verifiable Inner Product Functional Encryption Schemeefully designated. Malicious adversaries holding the decryption key can exploit it to gain insight into the master key or even alter the decryption key information. Consequently, key verification becomes necessary. To address this, we propose an identity-based key verifiable inner product functionalGEM 发表于 2025-3-22 17:42:30
DRSA: Debug Register-Based Self-relocating Attack Against Software-Based Remote Authentication DRSA monitors the execution of the checksum function using the debug registers and erases itself before the next attestation. Our evaluation demonstrates that DRSA incurs low overhead, and it is extremely difficult for the verifier to detect it.合乎习俗 发表于 2025-3-22 23:13:10
PSWS: A Private Support-Weighted Sum Protocol for Blockchain-Based E-Voting Systemstext throughout the weighting and counting processes, until the final result of the weighted vote is passed to the decryption server in ciphertext. This design avoids the disclosure of voter privacy and ballot information, and the ciphertext format also prevents malicious users from cheating or tamp大方一点 发表于 2025-3-23 02:36:16
http://reply.papertrans.cn/19/1893/189203/189203_9.png错 发表于 2025-3-23 08:35:42
http://reply.papertrans.cn/19/1893/189203/189203_10.png