铲除 发表于 2025-3-21 16:12:03

书目名称Information Security, Practice and Experience影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465441<br><br>        <br><br>书目名称Information Security, Practice and Experience影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465441<br><br>        <br><br>书目名称Information Security, Practice and Experience网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465441<br><br>        <br><br>书目名称Information Security, Practice and Experience网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465441<br><br>        <br><br>书目名称Information Security, Practice and Experience被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465441<br><br>        <br><br>书目名称Information Security, Practice and Experience被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465441<br><br>        <br><br>书目名称Information Security, Practice and Experience年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465441<br><br>        <br><br>书目名称Information Security, Practice and Experience年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465441<br><br>        <br><br>书目名称Information Security, Practice and Experience读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465441<br><br>        <br><br>书目名称Information Security, Practice and Experience读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465441<br><br>        <br><br>

外向者 发表于 2025-3-21 21:13:22

The Elliptic Curve Discrete Logarithm Problems over the ,-adic Field and Formal Groupse anomalous attack . In this paper, we propose an algorithm to solve the ECDLP on the .-adic field .. Our method is to use the theory of formal groups associated to elliptic curves, which is used for the anomalous attack proposed by Smart , and Satoh and Araki .

Brain-Imaging 发表于 2025-3-22 02:35:32

http://reply.papertrans.cn/47/4655/465441/465441_3.png

enfeeble 发表于 2025-3-22 05:55:09

http://reply.papertrans.cn/47/4655/465441/465441_4.png

Flu表流动 发表于 2025-3-22 12:09:24

http://reply.papertrans.cn/47/4655/465441/465441_5.png

WAIL 发表于 2025-3-22 13:56:29

Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholesconcept is introduced to provide the security feature known as availability and a simulator has been developed to analyze its behavior. Efficiency of the route discovery stage is analyzed and compared with the previous algorithms.

jettison 发表于 2025-3-22 19:57:26

http://reply.papertrans.cn/47/4655/465441/465441_7.png

初学者 发表于 2025-3-22 22:55:28

Privacy Preserving of Trust Management Credentials Based on Trusted Computinges. By modifying the traditional privacy preserving pattern, our scheme avoids the inadvertent disclosure of credential privacy attributes and provides a reliable solution for many privacy sensitive fields such as medical, business, and so on.

小淡水鱼 发表于 2025-3-23 03:20:14

http://reply.papertrans.cn/47/4655/465441/465441_9.png

Infelicity 发表于 2025-3-23 09:22:31

http://reply.papertrans.cn/47/4655/465441/465441_10.png
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Information Security, Practice and Experience; 6th International Co Jin Kwak,Robert H. Deng,Guilin Wang Conference proceedings 2010 Springe