磨碎 发表于 2025-3-25 05:19:24

http://reply.papertrans.cn/87/8634/863306/863306_21.png

Aesthete 发表于 2025-3-25 09:34:13

An Alternative Access Control Architecture for IP Over ATM Networkson management agents distributed in network equipment. Several examples are given illustrating the benefits of this architecture. The comparison with other approaches shows that this architecture provides big improvements in ATM-level access control, scalability and QoS preservation.

6Applepolish 发表于 2025-3-25 14:29:45

http://reply.papertrans.cn/87/8634/863306/863306_23.png

矛盾心理 发表于 2025-3-25 17:02:25

http://reply.papertrans.cn/87/8634/863306/863306_24.png

粗鄙的人 发表于 2025-3-25 21:23:59

Formal Design of Efficient Authentication and Key Agreement Protocolsed with inverse BAN logic”, SDL/.BAN is based on the inverse application of the BAN logic of Burrows, Abadi and Needham and the integration with the Specification and Description Language SDL. The exemplary formal design of Kerberos demonstrates the applicability and reliability of the method. We cl

Osteoarthritis 发表于 2025-3-26 00:53:21

On Authentication, Digital Signatures and Signature Lawsand compares the closely interrelated concepts of authentication, digital signatures and electronic signature laws and tries to explain and resolve some of the ambiguities. Non-trivial problems and issues not much seen in the debate are discussed together with some suggestions as to how to overcome

妈妈不开心 发表于 2025-3-26 07:27:50

Watermarking and Secure Distribution for Encrypted VideoT coefficients of the coded video into DC and AC coefficient parts, the encrypting process is applied first but only to the DC coefficient so that the watermarking process can be applied later to the AC coefficients. Although the video signal is not entirely encrypted, in some video applications suc

愚笨 发表于 2025-3-26 10:25:11

http://reply.papertrans.cn/87/8634/863306/863306_28.png

慢慢冲刷 发表于 2025-3-26 14:59:09

http://reply.papertrans.cn/87/8634/863306/863306_29.png

业余爱好者 发表于 2025-3-26 17:36:35

Secure Distributed Virtual Conferencingefficient distribution, uses strong authentication via cryptographic means, and (option­ally) provides fully encrypted communication without sac­rificing the quality of the medium or the user experience. We summarize our experiences with SDVC in a recent live demonstration and conclude with a discus
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Secure Information Networks; Communications and M Bart Preneel Book 1999 IFIP International Federation for Information Processing 1999 ATM.