polysomnography 发表于 2025-3-21 17:25:12

书目名称Information Security影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0465275<br><br>        <br><br>书目名称Information Security影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0465275<br><br>        <br><br>书目名称Information Security网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0465275<br><br>        <br><br>书目名称Information Security网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0465275<br><br>        <br><br>书目名称Information Security被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0465275<br><br>        <br><br>书目名称Information Security被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0465275<br><br>        <br><br>书目名称Information Security年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0465275<br><br>        <br><br>书目名称Information Security年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0465275<br><br>        <br><br>书目名称Information Security读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0465275<br><br>        <br><br>书目名称Information Security读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0465275<br><br>        <br><br>

无动于衷 发表于 2025-3-22 00:12:24

Spending Programs: A Tool for Flexible Micropaymentsfor one micropayment. A more flexible mechanism is proposed in this paper, whereby coupons of variable value can be generated by a . without increasing the transaction cost. Moreover, the spending program allows one of several alternative ways of splitting the amount withdrawn into re-usable coupons to be selected in real-time.

高兴去去 发表于 2025-3-22 01:07:08

http://reply.papertrans.cn/47/4653/465275/465275_3.png

indenture 发表于 2025-3-22 07:35:36

http://reply.papertrans.cn/47/4653/465275/465275_4.png

正论 发表于 2025-3-22 10:25:48

Fingerprints for Copyright Software Protectiondentity. For these two types of identity, we introduce two different fingerprint schemes. The two schemes use digital signatures and can be easily combined and extended to be resilient against partial fingerprint destruction.

表示向下 发表于 2025-3-22 14:09:48

A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption and provides sufficient security from the viewpoint of visibility and signal to noise ratio values. Thus the proposed method is suitable for the protection of the moving pictures with minimizing the overhead of MPEG video codec system. Also, we consider an authentication method appropriate for stream data such as MPEG video.

Accolade 发表于 2025-3-22 19:25:29

An Improvement on a Practical Secret Voting Schemeto the counting stage; hence the voters can . once they cast their ballots. This property, realized by the introduction of distributed talliers, will be beneficial in the practical implementation of a voting scheme where less round complexity is desired.

Paraplegia 发表于 2025-3-23 01:11:45

Security Properties of Software Componentsorm of the component. This classification could be used to determine how much the overall security of the component is dependent on the non-functional security properties of the component and to what extent the additional external protections are required in order to use the component in their specific application environment.

Offset 发表于 2025-3-23 04:20:27

Methods for Protecting a Mobile Agent’s Routeof route information, but on the other hand allow sites to detect modifying attacks of preceding sites. Though, under noncolluding attacks, all methodes presented provide a similar level of protection, they differ w.r.t. performance and the points of time when an attack can be detected.

珊瑚 发表于 2025-3-23 09:15:39

Region-Based Watermarking for Imagesprocessing. This paper proposes a technique, using image region segmentation, which alleviates many of the problems associated with pre-processing and thus allowing the detection process to be more independent as well as reducing the need for human intervention.
页: [1] 2 3 4 5 6 7 8
查看完整版本: Titlebook: Information Security; Second International Masahiro Mambo,Yuliang Zheng Conference proceedings 1999 Springer-Verlag Berlin Heidelberg 1999