intolerance 发表于 2025-3-27 00:12:43

Identity-Based Cryptography in Credit Card Payments,rd fraud that is prevalent on the Internet. Our method is founded on the identity-based cryptography and it secures the credit card transactions in such a way that many types of credit card fraud become either impossible or much more difficult for the attacker to perform simply by stealing the credi

遗传 发表于 2025-3-27 02:32:52

http://reply.papertrans.cn/25/2406/240583/240583_32.png

Microgram 发表于 2025-3-27 07:50:05

http://reply.papertrans.cn/25/2406/240583/240583_33.png

不确定 发表于 2025-3-27 12:22:03

http://reply.papertrans.cn/25/2406/240583/240583_34.png

emulsify 发表于 2025-3-27 16:08:22

http://reply.papertrans.cn/25/2406/240583/240583_35.png

TEM 发表于 2025-3-27 21:01:30

http://reply.papertrans.cn/25/2406/240583/240583_36.png

代替 发表于 2025-3-27 22:55:46

Optimizing SHA256 in Bitcoin Mining,nt system. Bitcoin depends on well-known cryptographic standards such as SHA-256. In this paper we revisit the cryptographic process which allows one to make money by producing new bitcoins. We reformulate this problem as a specific sort of Constrained Input Small Output (CISO) hashing problem and r

pericardium 发表于 2025-3-28 05:51:31

http://reply.papertrans.cn/25/2406/240583/240583_38.png

Acupressure 发表于 2025-3-28 08:55:08

Practical Authentication Protocols for Protecting and Sharing Sensitive Information on Mobile Devicanisms. This paper describes an architecture of MobInfoSec system for sharing documents with sensitive information using fine-grained access rules described by general access structures. However, the proper usage of general access structures requires trusted components and strong authentication prot

合适 发表于 2025-3-28 10:32:28

http://reply.papertrans.cn/25/2406/240583/240583_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Cryptography and Security Systems; Third International Zbigniew Kotulski,Bogdan Księżopolski,Katarzyna Ma Conference proceedings 2014 Spri