BRISK 发表于 2025-3-21 17:07:42
书目名称Information and Communications Security影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0465904<br><br> <br><br>书目名称Information and Communications Security影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0465904<br><br> <br><br>书目名称Information and Communications Security网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0465904<br><br> <br><br>书目名称Information and Communications Security网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0465904<br><br> <br><br>书目名称Information and Communications Security被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0465904<br><br> <br><br>书目名称Information and Communications Security被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0465904<br><br> <br><br>书目名称Information and Communications Security年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0465904<br><br> <br><br>书目名称Information and Communications Security年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0465904<br><br> <br><br>书目名称Information and Communications Security读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0465904<br><br> <br><br>书目名称Information and Communications Security读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0465904<br><br> <br><br>最小 发表于 2025-3-21 20:21:18
http://reply.papertrans.cn/47/4660/465904/465904_2.png跟随 发表于 2025-3-22 03:10:54
http://reply.papertrans.cn/47/4660/465904/465904_3.pngPepsin 发表于 2025-3-22 07:02:23
On the Security of a Multi-party Certified Email Protocol,scussed for years and a number of research papers appeared in the literature. But most of them deal with the two-party scenarios, i.e., there are only one sender and one recipient. In some applications, however, the same certified message may need to be sent to a set of recipients. In ISC’02, Ferrer思考而得 发表于 2025-3-22 12:24:40
http://reply.papertrans.cn/47/4660/465904/465904_5.png察觉 发表于 2025-3-22 13:24:20
,, – Secure Electronic Payment in Mobile Ad Hoc Networks,do not fulfill the requirements imposed by the highly dynamic and decentralized nature of MANETs. Either they rely on digital coins that suffer from usability problems, or they build on cellular phone technology which is bound to the availability of a fixed infrastructure. Therefore, we propose ., aMOT 发表于 2025-3-22 18:34:07
http://reply.papertrans.cn/47/4660/465904/465904_7.pngconcentrate 发表于 2025-3-22 23:08:42
Provably Secure Authenticated Tree Based Group Key Agreement,arua .’s unauthenticated ternary tree based multi-party extension of Joux’s key agreement protocol. The security is in the standard model as formalized by Bresson .. The proof is based on the techniques used by Katz and Yung in proving the security of their key agreement protocol.Lime石灰 发表于 2025-3-23 01:30:23
http://reply.papertrans.cn/47/4660/465904/465904_9.png出生 发表于 2025-3-23 08:26:02
http://reply.papertrans.cn/47/4660/465904/465904_10.png