notable 发表于 2025-3-21 20:07:32

书目名称Information Security Applications影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465296<br><br>        <br><br>书目名称Information Security Applications影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465296<br><br>        <br><br>书目名称Information Security Applications网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465296<br><br>        <br><br>书目名称Information Security Applications网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465296<br><br>        <br><br>书目名称Information Security Applications被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465296<br><br>        <br><br>书目名称Information Security Applications被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465296<br><br>        <br><br>书目名称Information Security Applications年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465296<br><br>        <br><br>书目名称Information Security Applications年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465296<br><br>        <br><br>书目名称Information Security Applications读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465296<br><br>        <br><br>书目名称Information Security Applications读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465296<br><br>        <br><br>

时代 发表于 2025-3-21 22:49:43

Turn On the Lights: User Behavior in Game Environment Using CPTEDter (FPS) to garner much attention. Both MMORPG and FPS requires lower network latency, as the users are constantly required to assess and respond to the gaming environment and other users’ decisions. Our study aims to investigate the users’ psychological behavior by changing the gaming environment.

预感 发表于 2025-3-22 00:58:21

QR Code Watermarking for Digital Imagesniques like digital watermarking can be used to embed data within a signal for purposes such as digital rights management. This paper investigates a watermarking technique for digital images using QR codes. The advantage of using QR codes for watermarking is that properties of the QR code structure

故意 发表于 2025-3-22 06:27:13

FSF: Code Coverage-Driven Fuzzing for Software-Defined Networkingudies focus on eliciting bugs in such SDN controller via penetration testing or fuzzing without considering code coverage feedback from a target controller under testing. We propose FSF, a code coverage-driven SDN fuzzer. We designed and implemented a fuzzing algorithm to take into account coverage

诱使 发表于 2025-3-22 12:34:43

DroPPPP: A P4 Approach to Mitigating DoS Attacks in SDNployment of services in the past decade. Despite these advantages, the fact that the functionality of SDN relies heavily on the controller with a much less capable data plane creates a single point of failure, which leaves the network susceptible to denial of service (DoS) attacks mainly targeting t

Meditative 发表于 2025-3-22 13:48:39

A Secure and Self-tallying E-voting System Based on Blockchainbecause of its properties of tamper resistance and transparency. However, existing schemes either require centralized authorities to tally ballots or can only handle a limited number of voters. This paper tries to propose a self-tallying e-voting system, i.e., the public can verify the validity of a

现存 发表于 2025-3-22 19:29:59

An Extended CTRT for AES-256 model. Though AES-128 whose key length . and block length . can be used in CTRT as a block cipher, AES-256 cannot be used in CTRT due to its intrinsic restriction of .. According to a recent ECRYPT-CSA report, AES-256 is strongly recommended rather than AES-128 for long term protection (security fo

土产 发表于 2025-3-22 23:04:10

A Blind Ring Signature Based on the Short Integer Solution Problemgn on a message on behalf of the group without revealing its identity but also the user who possesses the message to blind it before sending to the group to be signed. Blind ring signature schemes are essential components in e-commercial, e-voting etc. In this paper, we propose the first blind ring

执拗 发表于 2025-3-23 03:38:48

A Note on the Invisibility and Anonymity of Undeniable Signature Schemesfy invisibility which implies the inability of a user to determine the validity of a message and signature pair as introduced by Chaum et al. Galbraith and Mao later proposed the notion of anonymity which implies the infeasibility to determine which user has issued the signature. They also proved th

entice 发表于 2025-3-23 05:53:38

Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with rupt the secret signing keys. Secret signing keys of VLR schemes consist of tokens which can be used to identify the users. Thus VLR schemes restrict corrupting secret signing keys. VLR schemes can achieve full-anonymity by separating tokens from secret signing keys. However, separation of tokens gi
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Information Security Applications; 20th International C Ilsun You Conference proceedings 2020 Springer Nature Switzerland AG 2020 formal me