Sentry 发表于 2025-3-21 19:37:43

书目名称Information Security Practice and Experience影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0465318<br><br>        <br><br>书目名称Information Security Practice and Experience影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0465318<br><br>        <br><br>书目名称Information Security Practice and Experience网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0465318<br><br>        <br><br>书目名称Information Security Practice and Experience网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0465318<br><br>        <br><br>书目名称Information Security Practice and Experience被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0465318<br><br>        <br><br>书目名称Information Security Practice and Experience被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0465318<br><br>        <br><br>书目名称Information Security Practice and Experience年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0465318<br><br>        <br><br>书目名称Information Security Practice and Experience年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0465318<br><br>        <br><br>书目名称Information Security Practice and Experience读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0465318<br><br>        <br><br>书目名称Information Security Practice and Experience读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0465318<br><br>        <br><br>

Suppository 发表于 2025-3-21 23:32:06

http://reply.papertrans.cn/47/4654/465318/465318_2.png

考古学 发表于 2025-3-22 00:57:53

http://reply.papertrans.cn/47/4654/465318/465318_3.png

Compatriot 发表于 2025-3-22 07:47:44

http://reply.papertrans.cn/47/4654/465318/465318_4.png

帽子 发表于 2025-3-22 12:09:59

http://reply.papertrans.cn/47/4654/465318/465318_5.png

Benign 发表于 2025-3-22 13:56:34

On the Equivalence of Two Definitions of Visual Cryptography Schemeve two definitions are actually equivalent. Furthermore, we generalize the equivalence relation to general access structure basis matrix VCS and general access structure size invariant VCS. But the equivalence relation does not hold for non-basis matrix (.,.)-VCS.

Integrate 发表于 2025-3-22 20:58:37

http://reply.papertrans.cn/47/4654/465318/465318_7.png

扫兴 发表于 2025-3-23 00:39:21

http://reply.papertrans.cn/47/4654/465318/465318_8.png

刺耳 发表于 2025-3-23 04:43:33

Impossible Differential Attacks on Reduced-Round LBlockound LBlock based on a 14-round impossible differential. The data and time complexities are about 2. chosen plaintexts and 2. 21-round encryptions, respectively. As far as we know, these results are the currently best results on LBlock in the single key scenario.

红润 发表于 2025-3-23 09:14:56

High-Entropy Visual Identification for Touch Screen Devicestography , using no additional electronics and no memorization on the part of the user. Instead, we require the use of a transparency overlaid on the touch-screen. Our scheme is similar to the identification scheme of but tailored for constrained, touch-screen displays.
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Information Security Practice and Experience; 8th International Co Mark D. Ryan,Ben Smyth,Guilin Wang Conference proceedings 2012 Springer-