找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information and Communications Security; 9th International Co Sihan Qing,Hideki Imai,Guilin Wang Conference proceedings 2007 Springer-Verla

[复制链接]
楼主: sprawl
发表于 2025-3-25 05:21:47 | 显示全部楼层
发表于 2025-3-25 07:45:54 | 显示全部楼层
(Convertible) Undeniable Signatures Without Random Oracles were proposed in Eurocrypt 2005. The security of our scheme is based on the CDH and the decision linear assumption. Comparing only the part of undeniable signatures, our scheme uses more standard assumptions than the existing undeniable signatures without random oracles due to Laguillamie and Vergn
发表于 2025-3-25 14:57:38 | 显示全部楼层
发表于 2025-3-25 15:51:13 | 显示全部楼层
Preventing Unofficial Information Propagationied, or manipulated digital documents propagates the documents over the Internet and/or distributes those through physical distribution channels many challenges arise which document holders must overcome in order to mitigate the impact to their privacy or business. This paper focuses on the propagat
发表于 2025-3-25 20:38:31 | 显示全部楼层
Privacy Protection on Multiple Sensitive Attributes about an individual, the protection of multiple sensitive attributes has become an important problem. Different from the existing models of single sensitive attribute, extra associations among multiple sensitive attributes should be invested. Two kinds of disclosure scenarios may happen because of
发表于 2025-3-26 00:54:04 | 显示全部楼层
发表于 2025-3-26 07:26:14 | 显示全部楼层
A Semi-blind Watermarking Based on Discrete Wavelet Transformtication. The proposed scheme employed toral automorphism to scramble the host image and the watermark so as to enhance the security and fidelity of the embedded watermark. Later, the permuted watermark and the permuted host image were transformed by discrete wavelet transform. Next, the transformed
发表于 2025-3-26 08:31:18 | 显示全部楼层
On the Design of Fast Prefix-Preserving IP Address Anonymization Schemeerve prefix relationship after anonymization. To facilitate research on real time high speed network traffic, address anonymization algorithm should be fast and consistent. In this paper, the bit string based algorithm and the embedded bit string algorithm will be introduced. Bit string based algori
发表于 2025-3-26 13:03:47 | 显示全部楼层
发表于 2025-3-26 17:12:10 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-22 07:57
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表