Adulterate 发表于 2025-3-28 18:34:02

Conference proceedings 2011, Korea, in August 2010.The 25 revised full papers presented were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on cryptosystem, implementation, mobile security/secure coding, attack, biometrics, and secure protocol.

完成才能战胜 发表于 2025-3-28 21:57:59

http://reply.papertrans.cn/47/4653/465290/465290_42.png

停止偿付 发表于 2025-3-28 23:54:51

http://reply.papertrans.cn/47/4653/465290/465290_43.png

忘川河 发表于 2025-3-29 06:12:04

https://doi.org/10.1007/978-3-642-17955-6access control; authentication; cryptanalysis; cryptographic protocols; cryptographic security applicati

MUT 发表于 2025-3-29 09:04:39

http://reply.papertrans.cn/47/4653/465290/465290_45.png

开始发作 发表于 2025-3-29 12:31:21

Fast Scalar Multiplication for ECC over GF(,) Using Division Chainsain..One result of these more general and improved methods includes a slight increase over the scalar multiplication speeds reported at PKC. Furthermore, by the straightforward removal of rules for unusual cases, some particularly concise yet efficient presentations can be given for algorithms in th

跑过 发表于 2025-3-29 15:54:16

Hidden Credential Retrieval without Random Oraclesthat has been stored in the server by the user, being completely offline. Moreover, we include an explicit notion of identity ID that is useful in practice, so that the server knows whose encrypted credential is to be used in the protocol.

alleviate 发表于 2025-3-29 21:12:17

http://reply.papertrans.cn/47/4653/465290/465290_48.png

palette 发表于 2025-3-30 02:32:22

http://reply.papertrans.cn/47/4653/465290/465290_49.png

colloquial 发表于 2025-3-30 04:02:51

Hongying Liu,Guoyu Qian,Satoshi Goto,Yukiyasu Tsunooas strategies for evaluating creative artifacts and creative environments. All of these are grounded in specific examples from across a wide range of disciplines and contexts—art, mathematics, engineering, comp978-3-319-70274-2978-3-319-70275-9Series ISSN 2196-498X Series E-ISSN 2196-4998
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Security Applications; 11th International W Yongwha Chung,Moti Yung Conference proceedings 2011 Springer Berlin Heidelberg 2011