找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information and Communications Security; 7th International Co Sihan Qing,Wenbo Mao,Guilin Wang Conference proceedings 2005 Springer-Verlag

[复制链接]
查看: 54445|回复: 68
发表于 2025-3-21 18:46:34 | 显示全部楼层 |阅读模式
书目名称Information and Communications Security
副标题7th International Co
编辑Sihan Qing,Wenbo Mao,Guilin Wang
视频video
丛书名称Lecture Notes in Computer Science
图书封面Titlebook: Information and Communications Security; 7th International Co Sihan Qing,Wenbo Mao,Guilin Wang Conference proceedings 2005 Springer-Verlag
描述The Seventh International Conference on Information and Communications - curity,ICICS2005,washeldinBeijing,China,10-13December2005. TheICICS conference series is an established forum for exchanging new research ideas and development results in the areas of information security and applied crypt- raphy. The ?rst event began here in Beijing in 1997. Since then the conference series has been interleaving its venues in China and the rest of the world: ICICS 1997 in Beijing, China; ICICS 1999 in Sydney, Australia; ICICS 2001 in Xi’an, China; ICICS 2002 in Singapore; ICICS 2003 in Hohhot City, China; and ICICS 2004 in Malaga, Spain. The conference proceedings of the past events have - ways been published by Springer in the Lecture Notes in Computer Science series, with volume numbers, respectively: LNCS 1334,LNCS 1726,LNCS 2229, LNCS 2513, LNCS 2836, and LNCS 3269. ICICS 2005 was sponsored by the Chinese Academy of Sciences (CAS); the Beijing Natural Science Foundation of China under Grant No. 4052016; the National Natural Science Foundation of China under Grants No. 60083007 and No. 60573042;the NationalGrandFundamentalResearch973ProgramofChina under Grant No. G1999035802, and Hewlett-P
出版日期Conference proceedings 2005
关键词DoS attacks; Information; Signatur; access control; anonymity; communication; configuration; cryptanalysis;
版次1
doihttps://doi.org/10.1007/11602897
isbn_softcover978-3-540-30934-5
isbn_ebook978-3-540-32099-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
issn_series 0302-9743
copyrightSpringer-Verlag Berlin Heidelberg 2005
The information of publication is updating

书目名称Information and Communications Security影响因子(影响力)




书目名称Information and Communications Security影响因子(影响力)学科排名




书目名称Information and Communications Security网络公开度




书目名称Information and Communications Security网络公开度学科排名




书目名称Information and Communications Security被引频次




书目名称Information and Communications Security被引频次学科排名




书目名称Information and Communications Security年度引用




书目名称Information and Communications Security年度引用学科排名




书目名称Information and Communications Security读者反馈




书目名称Information and Communications Security读者反馈学科排名




单选投票, 共有 1 人参与投票
 

0票 0.00%

Perfect with Aesthetics

 

0票 0.00%

Better Implies Difficulty

 

1票 100.00%

Good and Satisfactory

 

0票 0.00%

Adverse Performance

 

0票 0.00%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 21:37:14 | 显示全部楼层
Conference proceedings 2005e series is an established forum for exchanging new research ideas and development results in the areas of information security and applied crypt- raphy. The ?rst event began here in Beijing in 1997. Since then the conference series has been interleaving its venues in China and the rest of the world
发表于 2025-3-22 02:35:21 | 显示全部楼层
On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol a standard intruder, and the liveness properties using an intruder that respects the resilient communication channels assumption. Finally, to provide further confidence in the protocol, several vulnerabilities on weaker versions of our protocol are exposed.
发表于 2025-3-22 05:46:58 | 显示全部楼层
Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Securityy. The attack is so efficient that forging a valid signature needs less computation than legally generating a signature, even considering only the user side. Our result implies that the security proof of the scheme must be invalid. Furthermore we point out the fault of the proof and explain why it invalidates the proof.
发表于 2025-3-22 09:46:04 | 显示全部楼层
Ciphertext Comparison, a New Solution to the Millionaire Problemrst solution to the millionaire problem to output a precise result (the two messages are equal or which is larger). Privacy in this new solution is achieved with an overwhelmingly large probability and strong enough in practice.
发表于 2025-3-22 15:29:03 | 显示全部楼层
Visual Cryptographic Protocols Using the Trusted Initializerng information is only overlaying each of the transparencies over each other. Hence, it is easy for non-expert users to execute them. The visual oblivious transfer and the visual commitment scheme proposed in this paper are based on the trusted initializer model.
发表于 2025-3-22 20:17:30 | 显示全部楼层
Session Table Architecture for Defending SYN Flood Attackgns different data structures for each other. On the base of multi-queue architecture, dynamical timeouts according to available resource improve securities of protected hosts against SYN flood attack. Experimental results show that the new architecture can work well in Gigabit Ethernet network.
发表于 2025-3-22 21:23:12 | 显示全部楼层
发表于 2025-3-23 04:56:57 | 显示全部楼层
发表于 2025-3-23 08:23:59 | 显示全部楼层
Private Itemset Support Countingse a computationally efficient PISC protocol with linear communication in the size of the database. Third, we show how to further reduce the communication by using various tradeoffs and random sampling techniques.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-2 05:23
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表