找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information and Communications Security; Third International Sihan Qing,Tatsuaki Okamoto,Jianying Zhou Conference proceedings 2001 Springe

[复制链接]
楼主: 方面
发表于 2025-3-28 17:28:17 | 显示全部楼层
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain, the scaling parameter in a typical watermarking algorithm and the degradation of watermarked images. Experimental results show that the estimation error of SNR and PSNR is less than 1 dB. Using this relationship, we design an adaptive insertion strategy that can be employed to embed watermarks in natural images with assigned SNR or PSNR.
发表于 2025-3-28 20:07:42 | 显示全部楼层
发表于 2025-3-29 02:03:41 | 显示全部楼层
Encryption Sticks (Randomats),ns, and wholesale transparency of issues, with potentially broad social implications. The e-stick will be cash purchased in a public shop (anonymity), and this off-Internet item will protect its user from the pervasive data nakedness in cyberspace.
发表于 2025-3-29 06:58:30 | 显示全部楼层
Cryptanalysis of the Improved User Efficient Blind Signatures,o pointed out that this scheme did not achieve the unlinkability property. Furthermore, he also proposed an improved blind signature scheme to remedy this weakness and reduce the computations for requests. In this article, we presents a linking strategy to show that this improved version is also not a true blind signature scheme.
发表于 2025-3-29 09:58:24 | 显示全部楼层
A Cyclic Window Algorithm for ECC Defined over Extension Fields,lications for a practically used curve in comparison with Lim-Hwang‘s results presented at PKC2000, the fastest previously reported. The algorithm was implemented on computers. As a result, scalar multiplication can be accomplished in 573μs, 595μs, and 254μs on Pentium II (450 MHz), 21164A (500 MHz), and 21264 (500 MHz) computers, respectively.
发表于 2025-3-29 11:56:14 | 显示全部楼层
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce, introduce derivatives regarding the uncertain values. This paper shows a theoretical pricing equation of the derivatives when the underlying digital objects have systematic default or revocation risks. We can make use of this pricing to estimate the risks.
发表于 2025-3-29 15:42:13 | 显示全部楼层
RBAC for XML Document Stores,Access control for XML document stores must recognise the finegrained nature of the document structure. In this paper we present an approach to access control for XML document stores. This framework is based on RBAC and includes a syntax for specifying access control policies for the store.
发表于 2025-3-29 23:07:43 | 显示全部楼层
发表于 2025-3-30 02:54:53 | 显示全部楼层
Applying NCP Logic to the Analysis of SSL 3.0,ntication mode of SSL 3.0 in detail, but all authentication modes have the two weak points. Especially, the flaw of the freshness of the pre-master secret may result in reuse of the pre-master secret, and we properly remedy it by introducing a nonce.
发表于 2025-3-30 06:43:45 | 显示全部楼层
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database ature for multilevel secure database. Our protocol ensures serializability, eliminates covert channels to have preference to a lower level transaction, and reduces the starvation of short-lived transaction. The efficiency of the proposed protocol was verified by experimental results.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-8 05:05
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表