BRISK 发表于 2025-3-21 17:07:42

书目名称Information and Communications Security影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0465904<br><br>        <br><br>书目名称Information and Communications Security影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0465904<br><br>        <br><br>书目名称Information and Communications Security网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0465904<br><br>        <br><br>书目名称Information and Communications Security网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0465904<br><br>        <br><br>书目名称Information and Communications Security被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0465904<br><br>        <br><br>书目名称Information and Communications Security被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0465904<br><br>        <br><br>书目名称Information and Communications Security年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0465904<br><br>        <br><br>书目名称Information and Communications Security年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0465904<br><br>        <br><br>书目名称Information and Communications Security读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0465904<br><br>        <br><br>书目名称Information and Communications Security读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0465904<br><br>        <br><br>

最小 发表于 2025-3-21 20:21:18

http://reply.papertrans.cn/47/4660/465904/465904_2.png

跟随 发表于 2025-3-22 03:10:54

http://reply.papertrans.cn/47/4660/465904/465904_3.png

Pepsin 发表于 2025-3-22 07:02:23

On the Security of a Multi-party Certified Email Protocol,scussed for years and a number of research papers appeared in the literature. But most of them deal with the two-party scenarios, i.e., there are only one sender and one recipient. In some applications, however, the same certified message may need to be sent to a set of recipients. In ISC’02, Ferrer

思考而得 发表于 2025-3-22 12:24:40

http://reply.papertrans.cn/47/4660/465904/465904_5.png

察觉 发表于 2025-3-22 13:24:20

,, – Secure Electronic Payment in Mobile Ad Hoc Networks,do not fulfill the requirements imposed by the highly dynamic and decentralized nature of MANETs. Either they rely on digital coins that suffer from usability problems, or they build on cellular phone technology which is bound to the availability of a fixed infrastructure. Therefore, we propose ., a

MOT 发表于 2025-3-22 18:34:07

http://reply.papertrans.cn/47/4660/465904/465904_7.png

concentrate 发表于 2025-3-22 23:08:42

Provably Secure Authenticated Tree Based Group Key Agreement,arua .’s unauthenticated ternary tree based multi-party extension of Joux’s key agreement protocol. The security is in the standard model as formalized by Bresson .. The proof is based on the techniques used by Katz and Yung in proving the security of their key agreement protocol.

Lime石灰 发表于 2025-3-23 01:30:23

http://reply.papertrans.cn/47/4660/465904/465904_9.png

出生 发表于 2025-3-23 08:26:02

http://reply.papertrans.cn/47/4660/465904/465904_10.png
页: [1] 2 3 4 5 6 7
查看完整版本: Titlebook: Information and Communications Security; 6th International Co Javier Lopez,Sihan Qing,Eiji Okamoto Conference proceedings 2004 Springer-Ver