哄笑 发表于 2025-3-21 17:41:50

书目名称Information Security影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465265<br><br>        <br><br>书目名称Information Security影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465265<br><br>        <br><br>书目名称Information Security网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465265<br><br>        <br><br>书目名称Information Security网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465265<br><br>        <br><br>书目名称Information Security被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465265<br><br>        <br><br>书目名称Information Security被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465265<br><br>        <br><br>书目名称Information Security年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465265<br><br>        <br><br>书目名称Information Security年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465265<br><br>        <br><br>书目名称Information Security读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465265<br><br>        <br><br>书目名称Information Security读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465265<br><br>        <br><br>

Instantaneous 发表于 2025-3-21 21:38:11

http://reply.papertrans.cn/47/4653/465265/465265_2.png

充足 发表于 2025-3-22 02:26:46

A Formal Approach to Distance-Bounding RFID Protocolsy are independent. Finally we assess the security of the RFID distance-bounding scheme due to Kim and Avoine in our model, and enhance it to include impersonation security and allow for errors due to noisy channel transmissions.

DALLY 发表于 2025-3-22 04:39:08

http://reply.papertrans.cn/47/4653/465265/465265_4.png

万灵丹 发表于 2025-3-22 11:12:54

RatBot: Anti-enume,ion Peer-to-Peer BotnetsBot, a P2P botnet that is able to defeat existing botnet enumeration methods. The key idea of RatBot is the existence of a fraction of bots that are indistinguishable from their fake identities. RatBot prevents adversaries from inferring its size even after its executables are fully exposed. To stud

SOW 发表于 2025-3-22 14:40:18

Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashesms. A close distance between the hash digest of flow . and a known SPIT suggests that flow . probably belongs the same bulk of the known SPIT. Finally, we also experimentally study the detection performance of the hash algorithms.

出处 发表于 2025-3-22 20:54:48

http://reply.papertrans.cn/47/4653/465265/465265_7.png

油膏 发表于 2025-3-22 21:22:37

http://reply.papertrans.cn/47/4653/465265/465265_8.png

Spartan 发表于 2025-3-23 05:02:20

Shinsaku Kiyomoto,Matt Henricksen,Wun-She Yap,Yuto Nakano,Kazuhide Fukushima

冥界三河 发表于 2025-3-23 07:53:54

http://reply.papertrans.cn/47/4653/465265/465265_10.png
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Information Security; 14th International C Xuejia Lai,Jianying Zhou,Hui Li Conference proceedings 2011 Springer-Verlag GmbH Berlin Heidelbe