大口水罐 发表于 2025-3-21 18:47:59

书目名称Information Security影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0465269<br><br>        <br><br>书目名称Information Security影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0465269<br><br>        <br><br>书目名称Information Security网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0465269<br><br>        <br><br>书目名称Information Security网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0465269<br><br>        <br><br>书目名称Information Security被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0465269<br><br>        <br><br>书目名称Information Security被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0465269<br><br>        <br><br>书目名称Information Security年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0465269<br><br>        <br><br>书目名称Information Security年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0465269<br><br>        <br><br>书目名称Information Security读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0465269<br><br>        <br><br>书目名称Information Security读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0465269<br><br>        <br><br>

策略 发表于 2025-3-22 00:11:03

Impossible-Differential Attacks on Large-Block Rijndaelprovide larger internal states when used as primitives for the construction of stream ciphers and hash functions. The main contributions of this paper are longer ID distinguishers found for large-block Rijndael versions, compared to the ones used for the AES.

让步 发表于 2025-3-22 00:31:56

http://reply.papertrans.cn/47/4653/465269/465269_3.png

DEMUR 发表于 2025-3-22 04:43:27

http://reply.papertrans.cn/47/4653/465269/465269_4.png

腼腆 发表于 2025-3-22 11:21:52

Identity-Based Proxy Re-encryption Without Random Oraclesemes, which are both proved secure in the standard model. The first one is efficient in both computation and ciphertext length, and the other one achieves chosen-ciphertext security. Our solutions answer the open problems left in the previous work.

abduction 发表于 2025-3-22 13:56:33

http://reply.papertrans.cn/47/4653/465269/465269_6.png

insurrection 发表于 2025-3-22 21:07:19

http://reply.papertrans.cn/47/4653/465269/465269_7.png

violate 发表于 2025-3-22 22:38:07

http://reply.papertrans.cn/47/4653/465269/465269_8.png

捐助 发表于 2025-3-23 05:16:32

Efficient Committed Oblivious Transfer of Bit Strings model, also assuming the random oracle model for efficient non-interactive proofs. Also, as a motivation for the use of COT instead of OT, we point out that a protocol which uses OT as a subprotocol may have subtle security issues in the presence of malicious adversaries.

遗留之物 发表于 2025-3-23 08:55:43

Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection twork features while considering a set of 180 different tuning parameters. The main contribution of this work is that it proposes a ranking mechanism to evaluate the effectiveness of features against different types of attacks, and that it suggests a pool of features that could be used to improve the detection process.
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Information Security; 10th International C Juan A. Garay,Arjen K. Lenstra,René Peralta Conference proceedings 2007 Springer-Verlag Berlin H