可乐 发表于 2025-3-21 18:58:35

书目名称Information Security Applications影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465291<br><br>        <br><br>书目名称Information Security Applications影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465291<br><br>        <br><br>书目名称Information Security Applications网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465291<br><br>        <br><br>书目名称Information Security Applications网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465291<br><br>        <br><br>书目名称Information Security Applications被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465291<br><br>        <br><br>书目名称Information Security Applications被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465291<br><br>        <br><br>书目名称Information Security Applications年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465291<br><br>        <br><br>书目名称Information Security Applications年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465291<br><br>        <br><br>书目名称Information Security Applications读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465291<br><br>        <br><br>书目名称Information Security Applications读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465291<br><br>        <br><br>

染色体 发表于 2025-3-21 23:32:01

Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machineof the proposed system can import data securely from the second workstation to the first through security guaranteed channel between the two workstations. The user can also read e-mail from the Internet on the first without fear of virus infection, and as a result the user does not need to be aware that she/he uses the two workstations.

死亡 发表于 2025-3-22 01:34:15

Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement Systemwhere one eavesdropper exists more than 40cm from .. After adopting this error-correcting code, we should transact 200 wireless packets between the nodes to share a 128-bit unguessable key against an eavesdropper.

Interim 发表于 2025-3-22 06:46:15

Efficient Implementation of the Pairing on Mobilephones Using BREWon ubiquitous devices. Indeed the processing speed of our implementation in ARM9 processors on BREW achieves under 100 milliseconds using the supersingular curve over .. It has become fast enough for implementing security applications using the pairing on mobilephones.

混杂人 发表于 2025-3-22 10:00:28

An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacksing insider attacks. We believe that these requirements are also representative of other scenarios. We develop a four layered protection architecture by using virtualization techniques based on these requirements. Therefore, the proposed architecture prevents insider attacks in scenarios with similar requirements as well.

慷慨不好 发表于 2025-3-22 14:17:13

http://reply.papertrans.cn/47/4653/465291/465291_6.png

Bouquet 发表于 2025-3-22 17:14:44

http://reply.papertrans.cn/47/4653/465291/465291_7.png

Gingivitis 发表于 2025-3-22 22:54:02

http://reply.papertrans.cn/47/4653/465291/465291_8.png

ALOFT 发表于 2025-3-23 05:23:00

Implementation of BioAPI Conformance Test Suite Using BSP Testing Modelrmance of the CTS, the experiment was performed using both commercial fingerprint verification and identification BSPs. The developed CTS will be installed at Korean National Biometrics Test Center and used to test whether commercial biometrics products are compliant to BioAPI.

跳脱衣舞的人 发表于 2025-3-23 08:55:02

Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384,512) for Hardware Impleughput and determine the architecture that achieves this throughput. In addition to providing the throughput optimal architecture for SHA2, the techniques presented can also be used to analyze and design optimal architectures for some other iterative hash algorithms.
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Information Security Applications; 8th International Wo Sehun Kim,Moti Yung,Hyung-Woo Lee Conference proceedings 2007 Springer-Verlag Berli