Wilder 发表于 2025-3-21 18:41:59

书目名称Cryptology and Network Security影响因子(影响力)<br>        http://impactfactor.cn/2024/if/?ISSN=BK0240604<br><br>        <br><br>书目名称Cryptology and Network Security影响因子(影响力)学科排名<br>        http://impactfactor.cn/2024/ifr/?ISSN=BK0240604<br><br>        <br><br>书目名称Cryptology and Network Security网络公开度<br>        http://impactfactor.cn/2024/at/?ISSN=BK0240604<br><br>        <br><br>书目名称Cryptology and Network Security网络公开度学科排名<br>        http://impactfactor.cn/2024/atr/?ISSN=BK0240604<br><br>        <br><br>书目名称Cryptology and Network Security被引频次<br>        http://impactfactor.cn/2024/tc/?ISSN=BK0240604<br><br>        <br><br>书目名称Cryptology and Network Security被引频次学科排名<br>        http://impactfactor.cn/2024/tcr/?ISSN=BK0240604<br><br>        <br><br>书目名称Cryptology and Network Security年度引用<br>        http://impactfactor.cn/2024/ii/?ISSN=BK0240604<br><br>        <br><br>书目名称Cryptology and Network Security年度引用学科排名<br>        http://impactfactor.cn/2024/iir/?ISSN=BK0240604<br><br>        <br><br>书目名称Cryptology and Network Security读者反馈<br>        http://impactfactor.cn/2024/5y/?ISSN=BK0240604<br><br>        <br><br>书目名称Cryptology and Network Security读者反馈学科排名<br>        http://impactfactor.cn/2024/5yr/?ISSN=BK0240604<br><br>        <br><br>

DEI 发表于 2025-3-21 21:57:14

A Generic Construction for Universally-Convertible Undeniable Signaturestended version, convertible undeniable signatures, equips the signer with the additional ability to make his undeniable signatures universally verifiable whenever required. A selectively-convertible undeniable signature scheme allows the signer to convert a single signature into a universally verifi

AXIS 发表于 2025-3-22 01:48:40

http://reply.papertrans.cn/25/2407/240604/240604_3.png

placebo 发表于 2025-3-22 06:06:33

http://reply.papertrans.cn/25/2407/240604/240604_4.png

Enrage 发表于 2025-3-22 12:26:54

http://reply.papertrans.cn/25/2407/240604/240604_5.png

地名表 发表于 2025-3-22 16:58:42

Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Aded wires), each of which are directed from . to . or vice-versa. The unreliability of the network is modeled by a Byzantine adversary with infinite computing power. We investigate the problem with two different adversarial settings: (i) threshold and (ii) non-threshold. In , the authors have char

地名表 发表于 2025-3-22 18:28:08

Forward-Secure Key Evolution in Wireless Sensor Networkstribution, we consider a system of dynamic pairwise keys based on design due to Ren, Tanmoy and Zhou. We design and analyze a variation of this scheme, in which capturing a node does not lead to security threats for the past communication..Instead of bit-flipping, we use a cryptographic one-way func

注意力集中 发表于 2025-3-23 00:39:07

A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locationsks. In this paper, we define security threats of location service and propose a new secure location service protocol that uses self-signed locations. In our proposed protocol, nodes register their public keys in other nodes during the initialization phase and these registered keys are used to verify

永久 发表于 2025-3-23 03:03:09

http://reply.papertrans.cn/25/2407/240604/240604_9.png

椭圆 发表于 2025-3-23 06:24:37

Running on Karma – P2P Reputation and Currency Systemsed resources. Moreover, selfish users may just connect for their own benefits without donating any resources. The concepts of reputation and currency give possible approaches to address these problems. However, to implement these ideas is non-trivial, due to the non-existence of a single trusted par
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Cryptology and Network Security; 6th International Co Feng Bao,San Ling,Chaoping Xing Conference proceedings 2007 Springer-Verlag Berlin He