myelography 发表于 2025-3-28 18:32:20

http://reply.papertrans.cn/25/2407/240604/240604_41.png

生命 发表于 2025-3-28 20:23:59

http://reply.papertrans.cn/25/2407/240604/240604_42.png

发展 发表于 2025-3-29 01:18:34

Grundlagen der betrieblichen Optimierung,l communication complexity (and computational complexity) with . =  max (3. − 2. + 1, 2. + 1) wires from . to .. Also with .′ =  max (3. − . + 1, 2. + 1) wires from . to ., we are able to further improve the communication complexity of our three phase PSMT protocol. Our second contribution in this p

有权威 发表于 2025-3-29 05:07:13

http://reply.papertrans.cn/25/2407/240604/240604_44.png

DIKE 发表于 2025-3-29 10:55:23

Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oraclesfeature of a secret credential. We provide a security model and then prove its security based on the .-Strong Diffie-Hellman (.-SDH) problem and the Computational Diffie-Hellman (CDH) problem in the standard model.

inundate 发表于 2025-3-29 15:03:17

A Generic Construction for Universally-Convertible Undeniable Signatures classic signature scheme, a selectively-convertible undeniable signature scheme and a collision-resistant hash function. Formal proofs guarantee that our construction has a tight security reduction to the underlying security assumptions. As one of the applications of our generic construction, one c

对待 发表于 2025-3-29 19:08:36

http://reply.papertrans.cn/25/2407/240604/240604_47.png

Femine 发表于 2025-3-29 23:21:11

Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adl communication complexity (and computational complexity) with . =  max (3. − 2. + 1, 2. + 1) wires from . to .. Also with .′ =  max (3. − . + 1, 2. + 1) wires from . to ., we are able to further improve the communication complexity of our three phase PSMT protocol. Our second contribution in this p

休闲 发表于 2025-3-30 02:49:50

An Intelligent Network-Warning Model with Strong SurvivabilityCART) to construct the self-adaptive algorithm, and choose the best method fitting the algorithm, which is CART. The prototype can not only reduce and classify the original alert data from different network security devices, but also correlate alerts and generate intrusion scenario graphs. The equal

灰心丧气 发表于 2025-3-30 04:58:21

http://reply.papertrans.cn/25/2407/240604/240604_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Cryptology and Network Security; 6th International Co Feng Bao,San Ling,Chaoping Xing Conference proceedings 2007 Springer-Verlag Berlin He