consolidate 发表于 2025-3-25 05:15:03

,Grundlagen der Lager- und Fördertechnik,tended version, convertible undeniable signatures, equips the signer with the additional ability to make his undeniable signatures universally verifiable whenever required. A selectively-convertible undeniable signature scheme allows the signer to convert a single signature into a universally verifi

旅行路线 发表于 2025-3-25 10:06:58

http://reply.papertrans.cn/25/2407/240604/240604_22.png

干涉 发表于 2025-3-25 11:38:28

http://reply.papertrans.cn/25/2407/240604/240604_23.png

破译 发表于 2025-3-25 17:44:47

https://doi.org/10.1007/b138514ity and anonymity concurrently. At a glance, these two properties seem to be contradictory. This is partly due to the fact that there exists . single definition that clearly defines these notions. We approach this problem by firstly define these properties formally and address the problem of achievi

Influx 发表于 2025-3-25 20:20:39

http://reply.papertrans.cn/25/2407/240604/240604_25.png

SOBER 发表于 2025-3-26 03:42:25

Grundlagen der betrieblichen Optimierung,tribution, we consider a system of dynamic pairwise keys based on design due to Ren, Tanmoy and Zhou. We design and analyze a variation of this scheme, in which capturing a node does not lead to security threats for the past communication..Instead of bit-flipping, we use a cryptographic one-way func

表示问 发表于 2025-3-26 06:54:42

https://doi.org/10.1007/b138514ks. In this paper, we define security threats of location service and propose a new secure location service protocol that uses self-signed locations. In our proposed protocol, nodes register their public keys in other nodes during the initialization phase and these registered keys are used to verify

Barter 发表于 2025-3-26 12:30:29

http://reply.papertrans.cn/25/2407/240604/240604_28.png

promote 发表于 2025-3-26 12:49:04

Grundlagen der betrieblichen Optimierung,ed resources. Moreover, selfish users may just connect for their own benefits without donating any resources. The concepts of reputation and currency give possible approaches to address these problems. However, to implement these ideas is non-trivial, due to the non-existence of a single trusted par

TEM 发表于 2025-3-26 16:53:02

Informations- und Kommunikationstechnik,rgue the previous security model is not complete regarding keyword privacy and the previous constructions are secure only in the random oracle model. We solve these problems by first defining a new security model, then give a generic construction which is secure in the new security model without ran
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Cryptology and Network Security; 6th International Co Feng Bao,San Ling,Chaoping Xing Conference proceedings 2007 Springer-Verlag Berlin He