烤问 发表于 2025-3-21 19:42:36

书目名称Information Security and Privacy影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465401<br><br>        <br><br>书目名称Information Security and Privacy影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465401<br><br>        <br><br>书目名称Information Security and Privacy网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465401<br><br>        <br><br>书目名称Information Security and Privacy网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465401<br><br>        <br><br>书目名称Information Security and Privacy被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465401<br><br>        <br><br>书目名称Information Security and Privacy被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465401<br><br>        <br><br>书目名称Information Security and Privacy年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465401<br><br>        <br><br>书目名称Information Security and Privacy年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465401<br><br>        <br><br>书目名称Information Security and Privacy读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465401<br><br>        <br><br>书目名称Information Security and Privacy读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465401<br><br>        <br><br>

Instantaneous 发表于 2025-3-21 20:55:32

Purpose-oriented access control model in object-based systems,. An object is modeled as a pair of data structure and operations. In the cooperation among multiple objects, it is important to protect against illegal information flow among the objects. In this paper, we discuss an access control model for an object-based system. We propose a novel . access contr

Peak-Bone-Mass 发表于 2025-3-22 03:37:36

http://reply.papertrans.cn/47/4655/465401/465401_3.png

发起 发表于 2025-3-22 05:31:48

http://reply.papertrans.cn/47/4655/465401/465401_4.png

Robust 发表于 2025-3-22 11:57:46

http://reply.papertrans.cn/47/4655/465401/465401_5.png

和平 发表于 2025-3-22 15:18:52

http://reply.papertrans.cn/47/4655/465401/465401_6.png

男学院 发表于 2025-3-22 18:27:53

http://reply.papertrans.cn/47/4655/465401/465401_7.png

Negotiate 发表于 2025-3-22 21:27:02

Using cyclotomic polynomials to construct efficient discrete logarithm cryptosystems over finite fi discrete logarithm based public key cryptosystems. Depending on the type of application and implementation, the resulting schemes may be up to three times faster than the fastest known schemes of comparable security that use more conventional choices of subgroups or finite fields.

种子 发表于 2025-3-23 03:27:12

http://reply.papertrans.cn/47/4655/465401/465401_9.png

交响乐 发表于 2025-3-23 05:36:16

On the security of self-synchronous ciphers,ditions, conventional synchronous stream ciphers suffer catastrophic message loss, whereas self-synchronous ciphers (SSCs) automatically re-synchronise after a short error burst, with no additional circuitry or protocols. In this paper we point out some security problems of SSCs which are unavoidabl
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Information Security and Privacy; Second Australasian Vijay Varadharajan,Josef Pieprzyk,Yi Mu Conference proceedings 1997 Springer-Verlag