祈求 发表于 2025-3-21 17:01:52

书目名称Information Security影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465261<br><br>        <br><br>书目名称Information Security影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465261<br><br>        <br><br>书目名称Information Security网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465261<br><br>        <br><br>书目名称Information Security网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465261<br><br>        <br><br>书目名称Information Security被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465261<br><br>        <br><br>书目名称Information Security被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465261<br><br>        <br><br>书目名称Information Security年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465261<br><br>        <br><br>书目名称Information Security年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465261<br><br>        <br><br>书目名称Information Security读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465261<br><br>        <br><br>书目名称Information Security读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465261<br><br>        <br><br>

能得到 发表于 2025-3-21 20:38:13

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465261.jpg

反馈 发表于 2025-3-22 00:32:31

http://reply.papertrans.cn/47/4653/465261/465261_3.png

欢呼 发表于 2025-3-22 07:59:24

http://reply.papertrans.cn/47/4653/465261/465261_4.png

葡萄糖 发表于 2025-3-22 09:29:45

http://reply.papertrans.cn/47/4653/465261/465261_5.png

难取悦 发表于 2025-3-22 14:08:21

http://reply.papertrans.cn/47/4653/465261/465261_6.png

符合规定 发表于 2025-3-22 18:01:59

Differential Attacks on Reduced RIPEMD-160tandard RIPEMD-160 was proposed 15 years ago and may be used as a drop-in replacement for SHA-1 due to their same hash output length. Only few results have been published for RIPEMD-160 so far and most attacks have a complexity very close to the generic bound. In this paper, we present the first app

nascent 发表于 2025-3-22 23:58:25

http://reply.papertrans.cn/47/4653/465261/465261_8.png

领巾 发表于 2025-3-23 01:33:55

On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree small inverse problems with higher degree. The problem is a natural extension of small secret exponent attack on RSA cryptosystem introduced by Boneh and Durfee. They reduced this attack to solving a bivariate modular equation: ., where . is a given integer and . is a public exponent. They proved t

爱好 发表于 2025-3-23 08:23:10

Strong Authentication with Mobile Phone The capacity of the human memory does not scale to the ever larger number of ever stronger passwords needed for these services. Single sign-on (SSO) systems help users cope with password fatigue, but SSO systems still mostly lack support for strong two-factor authentication. At the same time, the u
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Information Security; 15th International C Dieter Gollmann,Felix C. Freiling Conference proceedings 2012 Springer-Verlag Berlin Heidelberg