找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cryptology and Network Security; 6th International Co Feng Bao,San Ling,Chaoping Xing Conference proceedings 2007 Springer-Verlag Berlin He

[复制链接]
楼主: Wilder
发表于 2025-3-25 05:15:03 | 显示全部楼层
,Grundlagen der Lager- und Fördertechnik,tended version, convertible undeniable signatures, equips the signer with the additional ability to make his undeniable signatures universally verifiable whenever required. A selectively-convertible undeniable signature scheme allows the signer to convert a single signature into a universally verifi
发表于 2025-3-25 10:06:58 | 显示全部楼层
发表于 2025-3-25 11:38:28 | 显示全部楼层
发表于 2025-3-25 17:44:47 | 显示全部楼层
https://doi.org/10.1007/b138514ity and anonymity concurrently. At a glance, these two properties seem to be contradictory. This is partly due to the fact that there exists . single definition that clearly defines these notions. We approach this problem by firstly define these properties formally and address the problem of achievi
发表于 2025-3-25 20:20:39 | 显示全部楼层
发表于 2025-3-26 03:42:25 | 显示全部楼层
Grundlagen der betrieblichen Optimierung,tribution, we consider a system of dynamic pairwise keys based on design due to Ren, Tanmoy and Zhou. We design and analyze a variation of this scheme, in which capturing a node does not lead to security threats for the past communication..Instead of bit-flipping, we use a cryptographic one-way func
发表于 2025-3-26 06:54:42 | 显示全部楼层
https://doi.org/10.1007/b138514ks. In this paper, we define security threats of location service and propose a new secure location service protocol that uses self-signed locations. In our proposed protocol, nodes register their public keys in other nodes during the initialization phase and these registered keys are used to verify
发表于 2025-3-26 12:30:29 | 显示全部楼层
发表于 2025-3-26 12:49:04 | 显示全部楼层
Grundlagen der betrieblichen Optimierung,ed resources. Moreover, selfish users may just connect for their own benefits without donating any resources. The concepts of reputation and currency give possible approaches to address these problems. However, to implement these ideas is non-trivial, due to the non-existence of a single trusted par
发表于 2025-3-26 16:53:02 | 显示全部楼层
Informations- und Kommunikationstechnik,rgue the previous security model is not complete regarding keyword privacy and the previous constructions are secure only in the random oracle model. We solve these problems by first defining a new security model, then give a generic construction which is secure in the new security model without ran
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-26 07:37
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表