契约 发表于 2025-3-21 16:12:11

书目名称Information and Communications Security影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465898<br><br>        <br><br>书目名称Information and Communications Security影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465898<br><br>        <br><br>书目名称Information and Communications Security网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465898<br><br>        <br><br>书目名称Information and Communications Security网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465898<br><br>        <br><br>书目名称Information and Communications Security被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465898<br><br>        <br><br>书目名称Information and Communications Security被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465898<br><br>        <br><br>书目名称Information and Communications Security年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465898<br><br>        <br><br>书目名称Information and Communications Security年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465898<br><br>        <br><br>书目名称Information and Communications Security读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465898<br><br>        <br><br>书目名称Information and Communications Security读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465898<br><br>        <br><br>

农学 发表于 2025-3-21 22:27:02

A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computingd layer of the software stack is supposed to be able to maintain the correctness for one in a less privileged layer. In this work we first report evidences that this load-time code measurement method is insufficient for maintaining the software execution correctness. We propose a user-mode-kernel-mo

Slit-Lamp 发表于 2025-3-22 03:34:19

http://reply.papertrans.cn/47/4659/465898/465898_3.png

小母马 发表于 2025-3-22 05:11:30

http://reply.papertrans.cn/47/4659/465898/465898_4.png

Allure 发表于 2025-3-22 11:55:57

http://reply.papertrans.cn/47/4659/465898/465898_5.png

neologism 发表于 2025-3-22 15:41:47

Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codesr and nonlinear error detection schemes were proposed. Linear codes provide protection only against primitive adversaries which no longer represents practice. On the other hand nonlinear codes provide protection against strong adversaries, but at the price of high area overhead (200–300%). Here we p

喃喃而言 发表于 2025-3-22 17:11:22

Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systemt possible from anywhere at anytime. Going along with this evolution is an increasing demand for cryptographically secure network connections with such resource-restricted devices. The Secure Sockets Layer (SSL) protocol is the current de-facto standard for secure communication over an insecure netw

induct 发表于 2025-3-22 23:09:45

http://reply.papertrans.cn/47/4659/465898/465898_8.png

Antimicrobial 发表于 2025-3-23 04:44:41

http://reply.papertrans.cn/47/4659/465898/465898_9.png

使更活跃 发表于 2025-3-23 05:34:49

http://reply.papertrans.cn/47/4659/465898/465898_10.png
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Information and Communications Security; 11th International C Sihan Qing,Chris J. Mitchell,Guilin Wang Conference proceedings 2009 Springer