我要黑暗 发表于 2025-3-21 17:31:45
书目名称Information Security Theory and Practice影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0465342<br><br> <br><br>书目名称Information Security Theory and Practice影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0465342<br><br> <br><br>书目名称Information Security Theory and Practice网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0465342<br><br> <br><br>书目名称Information Security Theory and Practice网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0465342<br><br> <br><br>书目名称Information Security Theory and Practice被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0465342<br><br> <br><br>书目名称Information Security Theory and Practice被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0465342<br><br> <br><br>书目名称Information Security Theory and Practice年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0465342<br><br> <br><br>书目名称Information Security Theory and Practice年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0465342<br><br> <br><br>书目名称Information Security Theory and Practice读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0465342<br><br> <br><br>书目名称Information Security Theory and Practice读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0465342<br><br> <br><br>CLAN 发表于 2025-3-21 21:08:51
Secure Outsourcing in Discrete-Logarithm-Based and Pairing-Based Cryptography (Invited Talk)ally computing (including the secret inputs and outputs). We briefly review the recent advances on secure outsourcing of group exponentiation (in groups of known prime order as well as in groups of unknown order) and pairing computation.mighty 发表于 2025-3-22 03:00:04
Remote Credential Management with Mutual Attestation for Trusted Execution Environmentsn this work, we present novel protocols using mutual attestation for supporting four aspects of secure remote credential management with TEEs: ., ., ., and .. The proposed protocols are agnostic to the underlying TEE implementation and subjected to formal verification using Scyther, which found no attacks.Coronary 发表于 2025-3-22 08:38:48
Generating a Real-Time Constraint Engine for Network Protocolschanisms to generate the constraint engine code. Comparing the autogenerated version against a manually implemented, optimized version of the constraint engine indicates no significant difference in terms of their performance.ENDOW 发表于 2025-3-22 10:35:34
On the Non-repudiation of Isogeny Based Signature Scheme signature which threaten the non-repudiation of GPS signature. We also suggest how to prevent key substitution attack in general as well as our attack in this paper. We also present an example of our attack using Sage to illustrate isogenies of elliptic curves and our attack.碌碌之人 发表于 2025-3-22 13:45:28
http://reply.papertrans.cn/47/4654/465342/465342_6.pngconduct 发表于 2025-3-22 17:54:47
Conference proceedings 2019P 2018, held in Brussels, Belgium, in December 2018...The 13 revised full papers and 2 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: real world; cryptography; artificial learning; cybersecurity; and InternAmenable 发表于 2025-3-22 21:21:26
http://reply.papertrans.cn/47/4654/465342/465342_8.pngpainkillers 发表于 2025-3-23 05:05:44
http://reply.papertrans.cn/47/4654/465342/465342_9.pngCANT 发表于 2025-3-23 07:19:14
http://reply.papertrans.cn/47/4654/465342/465342_10.png