insecticide 发表于 2025-3-28 15:32:43

A Copy Protection Technique Using Multi-level Error Codingncluded in the proposed scheme, which lead to a sharp cutoff in the detection probability of an encryption key. This cutoff behavior could be employed to effectively prevent bit-by-bit copying of optical disks. The proposed scheme can be easily implemented in common players, being a simple and effective copy protection technique.

公司 发表于 2025-3-28 19:23:52

Hashing with PolynomialsIn this paper, we explore potential mathematical principles and structures that can provide the foundation for cryptographic hash functions, and also present a simple and efficiently computable hash function based on a non-associative operation with polynomials over a finite field of characteristic 2.

迅速飞过 发表于 2025-3-28 23:38:13

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465383.jpg

CLASP 发表于 2025-3-29 06:55:50

978-3-540-49112-5Springer-Verlag Berlin Heidelberg 2006

CRUE 发表于 2025-3-29 09:55:05

http://reply.papertrans.cn/47/4654/465383/465383_45.png

Melodrama 发表于 2025-3-29 14:19:58

0302-9743 Overview: 978-3-540-49112-5978-3-540-49114-9Series ISSN 0302-9743 Series E-ISSN 1611-3349

concert 发表于 2025-3-29 15:36:12

http://reply.papertrans.cn/47/4654/465383/465383_47.png

Receive 发表于 2025-3-29 21:08:22

A Time-Frame Based Trust Model for P2P Systemsulation show that, our trust model has advantages in modeling dynamic trust relationship and aggregating feedback information over the existing trust metrics. It is highly effective in countering malicious peers regarding strategic altering behavior and dishonest feedbacks of malicious peers.

VERT 发表于 2025-3-30 03:20:51

http://reply.papertrans.cn/47/4654/465383/465383_49.png

senile-dementia 发表于 2025-3-30 07:38:05

Florian Mendel,Norbert Pramstaller,Christian Rechbergerm of the profession is difficult to accept, failings in compassionate care are particularly concerning, given the defining characteristics of nursing include “to respect the dignity, autonomy and uniqueness of human beings” (RCN, 2003, p. 3). There is no doubt that emphasis needs to be placed on car
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Security and Cryptology – ICISC 2006; 9th International Co Min Surp Rhee,Byoungcheon Lee Conference proceedings 2006 Springer-V