搜索结果: 1-9 共查到“军事学 conference”相关记录9条 . 查询时间(0.109 秒)
第十三届信息安全与密码学国际会议(The 13th International Conference on Information Security and Cryptology)
第十三届 信息安全与密码学 国际会议
2017/10/24
The 13th China International Conference on Information Security and Cryptology (INSCRYPT 2017) will be held in Xi'an from November 3rd to November 5th, 2017, organized by the State Key Laboratry of In...
第14届国际安全和密码学会议(14th International Conference on Security and Cryptography)
第14届 国际安全和密码学 会议
2017/3/9
SECRYPT is an annual international conference covering research in information and communication security. The 14th International Conference on Security and Cryptography (SECRYPT 2017) will be held in...
CRYPTO 2016 is the 36th International Cryptology Conference. It will be held at the University of California, Santa Barbara (UCSB) from August 14 to 18, 2016. The academic program covers all aspects o...
the 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security
Cryptology Information Security
2016/7/19
Asiacrypt 2016, the 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security, will be organized by Vietnam Institute for Advanced Study in Mathematics...
The 23rd Conference on Selected Areas in Cryptography (SAC 2016)
applied cryptology hash function
2016/7/19
The 23rd Conference on Selected Areas in Cryptography (SAC 2016) will be held at Memorial University of Newfoundland, St. John’s, NL, Canada, on 10–12 August 2016.
A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme
Conference key distribution active attack colluding adversaries
2009/3/31
Very recently, Jung, Paeng and Kim [IEEE Communications Letters, Vol
8, No 7, pp 446{448, July 2004] have demonstrated the insecurity of Xu and Tilborg's
ID-based conference key distribution scheme,...
Security properties of two authenticated conference key agreement protocols
Security properties authenticated conference key agreement protocol insider attacks
2009/2/12
In this paper we analyse the security of two authenticated group key agreement
schemes based on the group key agreement protocol of Burmester
and Desmedt. One scheme was proposed by Burmester and De...
Cryptanalysis of an anonymous wireless authentication and conference key distribution
Cryptanalysis anonymous wireless authentication conference key distribution
2009/1/16
In this paper we analyse an anonymous wireless authentication and con-
ference key distribution scheme which is also designed to provide mobile
participants with user identification privacy during t...
The 14th Annual International Conference on the Theory and Application of Cryptology & Information Security(图)
Cryptology Information Security 14th Theory and Application
2008/5/14
December 7 - 11, 2008 Melbourne, Australia
The International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT, is the main annual event organised by Asi...