大口水罐 发表于 2025-3-21 18:47:59
书目名称Information Security影响因子(影响力)<br> http://impactfactor.cn/if/?ISSN=BK0465269<br><br> <br><br>书目名称Information Security影响因子(影响力)学科排名<br> http://impactfactor.cn/ifr/?ISSN=BK0465269<br><br> <br><br>书目名称Information Security网络公开度<br> http://impactfactor.cn/at/?ISSN=BK0465269<br><br> <br><br>书目名称Information Security网络公开度学科排名<br> http://impactfactor.cn/atr/?ISSN=BK0465269<br><br> <br><br>书目名称Information Security被引频次<br> http://impactfactor.cn/tc/?ISSN=BK0465269<br><br> <br><br>书目名称Information Security被引频次学科排名<br> http://impactfactor.cn/tcr/?ISSN=BK0465269<br><br> <br><br>书目名称Information Security年度引用<br> http://impactfactor.cn/ii/?ISSN=BK0465269<br><br> <br><br>书目名称Information Security年度引用学科排名<br> http://impactfactor.cn/iir/?ISSN=BK0465269<br><br> <br><br>书目名称Information Security读者反馈<br> http://impactfactor.cn/5y/?ISSN=BK0465269<br><br> <br><br>书目名称Information Security读者反馈学科排名<br> http://impactfactor.cn/5yr/?ISSN=BK0465269<br><br> <br><br>策略 发表于 2025-3-22 00:11:03
Impossible-Differential Attacks on Large-Block Rijndaelprovide larger internal states when used as primitives for the construction of stream ciphers and hash functions. The main contributions of this paper are longer ID distinguishers found for large-block Rijndael versions, compared to the ones used for the AES.让步 发表于 2025-3-22 00:31:56
http://reply.papertrans.cn/47/4653/465269/465269_3.pngDEMUR 发表于 2025-3-22 04:43:27
http://reply.papertrans.cn/47/4653/465269/465269_4.png腼腆 发表于 2025-3-22 11:21:52
Identity-Based Proxy Re-encryption Without Random Oraclesemes, which are both proved secure in the standard model. The first one is efficient in both computation and ciphertext length, and the other one achieves chosen-ciphertext security. Our solutions answer the open problems left in the previous work.abduction 发表于 2025-3-22 13:56:33
http://reply.papertrans.cn/47/4653/465269/465269_6.pnginsurrection 发表于 2025-3-22 21:07:19
http://reply.papertrans.cn/47/4653/465269/465269_7.pngviolate 发表于 2025-3-22 22:38:07
http://reply.papertrans.cn/47/4653/465269/465269_8.png捐助 发表于 2025-3-23 05:16:32
Efficient Committed Oblivious Transfer of Bit Strings model, also assuming the random oracle model for efficient non-interactive proofs. Also, as a motivation for the use of COT instead of OT, we point out that a protocol which uses OT as a subprotocol may have subtle security issues in the presence of malicious adversaries.遗留之物 发表于 2025-3-23 08:55:43
Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection twork features while considering a set of 180 different tuning parameters. The main contribution of this work is that it proposes a ranking mechanism to evaluate the effectiveness of features against different types of attacks, and that it suggests a pool of features that could be used to improve the detection process.