找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cryptology and Network Security; 9th International Co Swee-Huay Heng,Rebecca N. Wright,Bok-Min Goi Conference proceedings 2010 Springer Ber

[复制链接]
查看: 42841|回复: 67
发表于 2025-3-21 18:30:55 | 显示全部楼层 |阅读模式
书目名称Cryptology and Network Security
副标题9th International Co
编辑Swee-Huay Heng,Rebecca N. Wright,Bok-Min Goi
视频video
概述Fast track conference proceedings
丛书名称Lecture Notes in Computer Science
图书封面Titlebook: Cryptology and Network Security; 9th International Co Swee-Huay Heng,Rebecca N. Wright,Bok-Min Goi Conference proceedings 2010 Springer Ber
描述The 9th International Conference on Cryptology and Network Security (CANS 2010) was held in Kuala Lumpur, Malaysia during December 12–14, 2010. The conference was co-organized by the Multimedia University (MMU), Malaysia, and Universiti Tunku Abdul Rahman (UTAR), Malaysia. The conference received 64 submissions from 22 countries, out of which 21 were accepted after a careful and thorough review process. These proceedings also contain abstracts for two invited talks. All submissions were reviewed by at least three members of the Program Committee; those authored or co-authored by Program Committee members were reviewed by at least ?ve reviewers. P- gram Committee members were allowed to use external reviewers to assist with their reviews, but remained responsible for the contents of the review and r- resenting papers during the discussion and decision making. The review phase was followed by a 10-day discussion phase in which each paper with at least one supporting review was discussed, additional experts were consulted where needed, and ?nal decisions were made. We thank the Program Committee for their hard work in selecting the p- gram. We also thank the external reviewers who ass
出版日期Conference proceedings 2010
关键词AES; CCMP; Crib; SHA-3; Skein; X; 509; block ciphers; cryptanalysis; cryptographic protocols; cryptography; cry
版次1
doihttps://doi.org/10.1007/978-3-642-17619-7
isbn_softcover978-3-642-17618-0
isbn_ebook978-3-642-17619-7Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer Berlin Heidelberg 2010
The information of publication is updating

书目名称Cryptology and Network Security影响因子(影响力)




书目名称Cryptology and Network Security影响因子(影响力)学科排名




书目名称Cryptology and Network Security网络公开度




书目名称Cryptology and Network Security网络公开度学科排名




书目名称Cryptology and Network Security被引频次




书目名称Cryptology and Network Security被引频次学科排名




书目名称Cryptology and Network Security年度引用




书目名称Cryptology and Network Security年度引用学科排名




书目名称Cryptology and Network Security读者反馈




书目名称Cryptology and Network Security读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 22:02:38 | 显示全部楼层
0302-9743 onal experts were consulted where needed, and ?nal decisions were made. We thank the Program Committee for their hard work in selecting the p- gram. We also thank the external reviewers who ass978-3-642-17618-0978-3-642-17619-7Series ISSN 0302-9743 Series E-ISSN 1611-3349
发表于 2025-3-22 02:48:40 | 显示全部楼层
Authentication and user management case for using an Elliptic Curve Cryptography (ECC)-based cipher suite. We show in this paper that, for high security levels, ECC-based cipher suites outperform their RSA counterparts on the client side, even though they require the integration of diverse countermeasures against side-channel attack
发表于 2025-3-22 06:22:21 | 显示全部楼层
发表于 2025-3-22 12:38:07 | 显示全部楼层
发表于 2025-3-22 16:00:09 | 显示全部楼层
发表于 2025-3-22 19:26:32 | 显示全部楼层
发表于 2025-3-23 00:55:06 | 显示全部楼层
https://doi.org/10.1007/b139044ed images will be distorted (e.g. translated, scaled, warped) and overlapped but additionally the depth of the 3D text objects in the stereoscopic images will add a degree of complexity to the CAPTCHA and make it harder for CAPTCHA attacks (due to positive and negative parallax in the stereo pair).
发表于 2025-3-23 02:23:51 | 显示全部楼层
Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices case for using an Elliptic Curve Cryptography (ECC)-based cipher suite. We show in this paper that, for high security levels, ECC-based cipher suites outperform their RSA counterparts on the client side, even though they require the integration of diverse countermeasures against side-channel attack
发表于 2025-3-23 06:13:22 | 显示全部楼层
User Tracking Based on Behavioral Fingerprintsent values that provide valuable information due to their combination..This article focuses on the extraction and analysis of features that are valuable for fingerprinting by employing ., a concept based on artificial intelligence and machine learning techniques. The concept is applied to email head
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-26 04:50
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表