马笼头 发表于 2025-3-28 17:28:17

Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain, the scaling parameter in a typical watermarking algorithm and the degradation of watermarked images. Experimental results show that the estimation error of SNR and PSNR is less than 1 dB. Using this relationship, we design an adaptive insertion strategy that can be employed to embed watermarks in natural images with assigned SNR or PSNR.

分开如此和谐 发表于 2025-3-28 20:07:42

http://reply.papertrans.cn/47/4659/465896/465896_42.png

Invertebrate 发表于 2025-3-29 02:03:41

Encryption Sticks (Randomats),ns, and wholesale transparency of issues, with potentially broad social implications. The e-stick will be cash purchased in a public shop (anonymity), and this off-Internet item will protect its user from the pervasive data nakedness in cyberspace.

使纠缠 发表于 2025-3-29 06:58:30

Cryptanalysis of the Improved User Efficient Blind Signatures,o pointed out that this scheme did not achieve the unlinkability property. Furthermore, he also proposed an improved blind signature scheme to remedy this weakness and reduce the computations for requests. In this article, we presents a linking strategy to show that this improved version is also not a true blind signature scheme.

Juvenile 发表于 2025-3-29 09:58:24

A Cyclic Window Algorithm for ECC Defined over Extension Fields,lications for a practically used curve in comparison with Lim-Hwang‘s results presented at PKC2000, the fastest previously reported. The algorithm was implemented on computers. As a result, scalar multiplication can be accomplished in 573μs, 595μs, and 254μs on Pentium II (450 MHz), 21164A (500 MHz), and 21264 (500 MHz) computers, respectively.

BINGE 发表于 2025-3-29 11:56:14

A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce, introduce derivatives regarding the uncertain values. This paper shows a theoretical pricing equation of the derivatives when the underlying digital objects have systematic default or revocation risks. We can make use of this pricing to estimate the risks.

不规则的跳动 发表于 2025-3-29 15:42:13

RBAC for XML Document Stores,Access control for XML document stores must recognise the finegrained nature of the document structure. In this paper we present an approach to access control for XML document stores. This framework is based on RBAC and includes a syntax for specifying access control policies for the store.

圣人 发表于 2025-3-29 23:07:43

http://reply.papertrans.cn/47/4659/465896/465896_48.png

CLAIM 发表于 2025-3-30 02:54:53

Applying NCP Logic to the Analysis of SSL 3.0,ntication mode of SSL 3.0 in detail, but all authentication modes have the two weak points. Especially, the flaw of the freshness of the pre-master secret may result in reuse of the pre-master secret, and we properly remedy it by introducing a nonce.

建筑师 发表于 2025-3-30 06:43:45

A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database ature for multilevel secure database. Our protocol ensures serializability, eliminates covert channels to have preference to a lower level transaction, and reduces the starvation of short-lived transaction. The efficiency of the proposed protocol was verified by experimental results.
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information and Communications Security; Third International Sihan Qing,Tatsuaki Okamoto,Jianying Zhou Conference proceedings 2001 Springe