intolerance 发表于 2025-3-30 12:14:28
0302-9743 eld in Beijing, China in November 1997..The 37 revised full papers presented were selected from a total of 87 submissions. Also included are 11 short papers. The book is divided in sections on theoretical foundations of security, secret sharing, network security, authentication and identification, BCholecystokinin 发表于 2025-3-30 15:49:16
http://reply.papertrans.cn/47/4659/465895/465895_52.pnggait-cycle 发表于 2025-3-30 18:47:32
On the decomposition constructions for perfect secret sharing schemes,hemes for connected graphs on six vertices. In addition, we also propose some efficient decomposition constructions for perfect secret sharing schemes with access structures of constant rank. Compared with the best previous constructions, our constructions have some improved lower bounds on the information rate.Intercept 发表于 2025-3-30 22:51:44
http://reply.papertrans.cn/47/4659/465895/465895_54.png媒介 发表于 2025-3-31 03:38:00
Stateless connections,in this way are more robust against denial of service resulting from high loads and resource exhausting attacks than their stateful counterparts. In particular, stateless authentication resists attacks that leave connections in a half-open state.善变 发表于 2025-3-31 07:25:12
Multisender authentication systems with unconditional security, provide perfect protection. We give two generic constructions using secret sharing schemes and authentication codes as the underlying primitives and show that key-efficient and fast SGA-systems can be constructed by proper choice of the two primitives.Obvious 发表于 2025-3-31 12:16:01
http://reply.papertrans.cn/47/4659/465895/465895_57.png染色体 发表于 2025-3-31 16:26:34
http://reply.papertrans.cn/47/4659/465895/465895_58.pngseparate 发表于 2025-3-31 18:31:32
http://reply.papertrans.cn/47/4659/465895/465895_59.pngRepatriate 发表于 2025-3-31 22:08:05
Conference proceedings 1997ctions and stream ciphers, security evaluation, signatures, public key systems, cryptanalysis of public key systems, subliminal channels, key recovery, intellectual property protection, protocols, and electronic commerce.