压舱物 发表于 2025-3-28 17:45:19

http://reply.papertrans.cn/47/4660/465904/465904_41.png

Judicious 发表于 2025-3-28 22:09:04

Provably Secure Authenticated Tree Based Group Key Agreement,arua .’s unauthenticated ternary tree based multi-party extension of Joux’s key agreement protocol. The security is in the standard model as formalized by Bresson .. The proof is based on the techniques used by Katz and Yung in proving the security of their key agreement protocol.

佛刊 发表于 2025-3-29 00:49:09

978-3-540-23563-7Springer-Verlag Berlin Heidelberg 2004

Incise 发表于 2025-3-29 06:44:11

http://reply.papertrans.cn/47/4660/465904/465904_44.png

Allege 发表于 2025-3-29 09:18:23

0302-9743 Overview: Includes supplementary material: 978-3-540-23563-7978-3-540-30191-2Series ISSN 0302-9743 Series E-ISSN 1611-3349

重力 发表于 2025-3-29 14:13:03

http://reply.papertrans.cn/47/4660/465904/465904_46.png

公理 发表于 2025-3-29 15:40:28

http://reply.papertrans.cn/47/4660/465904/465904_47.png

stress-test 发表于 2025-3-29 23:15:15

A Semi-fragile Steganographic Digital Signature for Images,ed Bit-Plane Complexity Segmentation (BPCS) Based Steganography scheme. Semi-fragile implies survival from limited processing, which is achieved by utilising Convolutional coding, a Forward Error Correcting (FEC) channel coding technique, in the embedding.

Hallmark 发表于 2025-3-30 02:31:51

Identification of Traitors Using a Trellis,f the sets to be embedded are the codewords of an error correcting code then efficient algorithms can be used to trace the traitors. In this paper we present a tracing algorithm, that by applying the Viterbi algorithm to the trellis representation of a cyclic traceability code, finds all possibly identifiable traitors.

SPURN 发表于 2025-3-30 04:47:27

http://reply.papertrans.cn/47/4660/465904/465904_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information and Communications Security; 6th International Co Javier Lopez,Sihan Qing,Eiji Okamoto Conference proceedings 2004 Springer-Ver