没血色 发表于 2025-4-1 02:10:13

A Ring Signature Scheme Using Bilinear Pairingsography very recently. Ring signature is a very useful tool to provide the user’s anonymity and the signer’s privacy. In this paper, we propose a ring signature scheme based on the bilinear pairings, which is secure against chosen message attacks without random oracles. Moreover, we use this ring si

现存 发表于 2025-4-1 09:21:36

http://reply.papertrans.cn/47/4653/465286/465286_62.png

alcohol-abuse 发表于 2025-4-1 10:38:57

http://reply.papertrans.cn/47/4653/465286/465286_63.png

睨视 发表于 2025-4-1 18:21:33

http://reply.papertrans.cn/47/4653/465286/465286_64.png

Water-Brash 发表于 2025-4-1 21:11:04

Application of Content Computing in Honeyfarms replication of web sites aiming to redirect hackers from the corresponding production sites. To achieve the goal, transparency and quick access are the basic requirements for honeyfarm. Content delivery network (CDN) is one method for providing replicated web sites and the technique is able to add

原告 发表于 2025-4-1 23:00:09

http://reply.papertrans.cn/47/4653/465286/465286_66.png

JECT 发表于 2025-4-2 02:51:58

formation processing systems. Custom and boxed desktop and network solutions, data storage systems, GIS systems are used to monitor and manage the urban infrastructure, as a system as a whole, as well as its components. Over the past few years, a number of developments have emerged that offer cloud

排他 发表于 2025-4-2 08:33:49

http://reply.papertrans.cn/47/4653/465286/465286_68.png

脱毛 发表于 2025-4-2 13:33:51

Young Jae Choi,Soon Ja Kimformation processing systems. Custom and boxed desktop and network solutions, data storage systems, GIS systems are used to monitor and manage the urban infrastructure, as a system as a whole, as well as its components. Over the past few years, a number of developments have emerged that offer cloud
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Information Security Applications; 5th International Wo Chae Hoon Lim,Moti Yung Conference proceedings 2005 Springer-Verlag Berlin Heidelbe