Gullet 发表于 2025-3-21 16:21:04
书目名称Cybercryptography: Applicable Cryptography for Cyberspace Security影响因子(影响力)<br> http://impactfactor.cn/if/?ISSN=BK0241862<br><br> <br><br>书目名称Cybercryptography: Applicable Cryptography for Cyberspace Security影响因子(影响力)学科排名<br> http://impactfactor.cn/ifr/?ISSN=BK0241862<br><br> <br><br>书目名称Cybercryptography: Applicable Cryptography for Cyberspace Security网络公开度<br> http://impactfactor.cn/at/?ISSN=BK0241862<br><br> <br><br>书目名称Cybercryptography: Applicable Cryptography for Cyberspace Security网络公开度学科排名<br> http://impactfactor.cn/atr/?ISSN=BK0241862<br><br> <br><br>书目名称Cybercryptography: Applicable Cryptography for Cyberspace Security被引频次<br> http://impactfactor.cn/tc/?ISSN=BK0241862<br><br> <br><br>书目名称Cybercryptography: Applicable Cryptography for Cyberspace Security被引频次学科排名<br> http://impactfactor.cn/tcr/?ISSN=BK0241862<br><br> <br><br>书目名称Cybercryptography: Applicable Cryptography for Cyberspace Security年度引用<br> http://impactfactor.cn/ii/?ISSN=BK0241862<br><br> <br><br>书目名称Cybercryptography: Applicable Cryptography for Cyberspace Security年度引用学科排名<br> http://impactfactor.cn/iir/?ISSN=BK0241862<br><br> <br><br>书目名称Cybercryptography: Applicable Cryptography for Cyberspace Security读者反馈<br> http://impactfactor.cn/5y/?ISSN=BK0241862<br><br> <br><br>书目名称Cybercryptography: Applicable Cryptography for Cyberspace Security读者反馈学科排名<br> http://impactfactor.cn/5yr/?ISSN=BK0241862<br><br> <br><br>arthroscopy 发表于 2025-3-21 23:18:39
http://reply.papertrans.cn/25/2419/241862/241862_2.pngNATAL 发表于 2025-3-22 00:50:56
http://reply.papertrans.cn/25/2419/241862/241862_3.pngintimate 发表于 2025-3-22 04:53:35
Cybercryptography: Applicable Cryptography for Cyberspace Security978-3-319-72536-9媒介 发表于 2025-3-22 08:53:32
pplicable to cyberspace security.Accessible to a wide range .This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas爆米花 发表于 2025-3-22 16:48:14
https://doi.org/10.1007/978-3-658-06265-1nd widely used public-key cryptography RSA relies exactly on the intractability the integer factorization problem. I this chapter we discuss various factoring based cryptographic systems and protocols.爆米花 发表于 2025-3-22 20:06:22
Judith Heße-Husain,Claudia Meßtorffkes the advantage of trojan horses, worms, and back doors) becomes a dangerous attack to the cyberspace. In this last chapter of the book, we shall discuss some of the offensive (unconventional and illegal) uses of cryptography as an attack to cyberspace.征税 发表于 2025-3-23 00:08:29
Factoring Based Cryptography,nd widely used public-key cryptography RSA relies exactly on the intractability the integer factorization problem. I this chapter we discuss various factoring based cryptographic systems and protocols.脱水 发表于 2025-3-23 01:56:57
http://reply.papertrans.cn/25/2419/241862/241862_9.png认识 发表于 2025-3-23 05:42:53
http://reply.papertrans.cn/25/2419/241862/241862_10.png