ASTER 发表于 2025-3-28 16:17:07

http://reply.papertrans.cn/88/8761/876095/876095_41.png

山羊 发表于 2025-3-28 19:56:53

,Security Management — The Process,is given on the writing of security policies, the assessment of risks, the realistic appraisal of threats and the selection of countermeasures. All of the mechanisms available can then be put into their proper place within the organisation to achieve the desired security. Moreover, it will be possib

BATE 发表于 2025-3-29 00:29:51

http://reply.papertrans.cn/88/8761/876095/876095_43.png

伙伴 发表于 2025-3-29 05:44:00

http://reply.papertrans.cn/88/8761/876095/876095_44.png

Aqueous-Humor 发表于 2025-3-29 07:47:19

GSM: Security, Services, and the SIM,ing the whereabouts of a user by listening to signalling data are other serious threats. This paper discusses countermeasures designed into the Global System for Mobile communications, the rÔle of the Subscriber Identity Module as a security device and security aspects related to the management of the secret authentication keys.

啮齿动物 发表于 2025-3-29 13:25:31

http://reply.papertrans.cn/88/8761/876095/876095_46.png

anticipate 发表于 2025-3-29 19:37:36

State of the Art in Applied Cryptography978-3-540-49248-1Series ISSN 0302-9743 Series E-ISSN 1611-3349

SLAG 发表于 2025-3-29 23:36:45

http://reply.papertrans.cn/88/8761/876095/876095_48.png

自制 发表于 2025-3-30 02:21:36

http://reply.papertrans.cn/88/8761/876095/876095_49.png

奖牌 发表于 2025-3-30 06:45:44

,Elliptic Curve Public-Key Cryptosystems — An Introduction,We give a brief introduction to elliptic curve public-key cryptosystems. We explain how the discrete logarithm in an elliptic curve group can be used to construct cryptosystems. We also focus on practical aspects such as implementation, standardization and intellectual property.
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: State of the Art in Applied Cryptography; Course on Computer S Bart Preneel,Vincent Rijmen Book 1998 Springer-Verlag Berlin Heidelberg 1998