|
[讨论]+[调查]這樣的工資算是....
上海那種那城市又發達的地方,房價跟天文數字一樣,一般人要不吃不喝不花個 20 年到 200 年(的工資)才有可能買房。 台北市,高雄市或是台中市的某些地區也是類似的狀況。 倫敦市有分6 區,一般而言,越是接近市中心的地段越貴。 我想世界各國都類似有這樣的情況。 前幾天我問了福建省福州來的人,她說廈門比福州、泉州及其它地方的消費還要高。 |
|
[分享]GPUs + Information Security issue papers.
搞出一個軟件出來。 近程目標是搞出一個小軟件。 中程目標是搞出一個可以分解 RSA 512 bits 的軟件。 遠程目標,等有辦法完成中程目標時,再計劃。 以上只有進度表,沒有時間表。 |
|
|
|
|
|
[讨论]+[调查]這樣的工資算是....
隨口問問~ 聽說那邊台灣人不少~ 現在一時之間來不及(到中國駐英國倫敦大使館)辦台胞證~ 所以經香港也沒辦法進入大陸~ 所以只能回台灣辦台胞證~ 若我回台灣~就不會從上海或是香港進入大陸~ 我可能會從金門--->廈門. 福建那邊有人回覆我工資大約在七千多元RMB. 七千多是多少~沒細講~ 所以我以七千整來計算~ |
|
[讨论]+[调查]這樣的工資算是....
阿忆 4786元!北大副教授、《实话实说》前主持人阿忆在新浪博客中公布工资单引起了网友极大的反响,昨日(20日),北大副教授孔庆东力挺阿忆,并在接受记者采访时称这绝非哭穷,只是希望公众能够了解事情真相。 缘起:言称“社会分层不可怕” 本月15日,阿忆在博客上发表的《无脑人,请你给俺指条出路,让俺们都照着去走》引起网友极大反响,短短5天时间内点击率近80万,评论达3000条。 去年年底,阿忆调入北大,工作之余经常客串节目主持人及嘉宾,阿忆的这一行为受到网友的指责,留言攻击他“简直太不敬业,道德和人格十分可疑,四处走学术穴是不务正业”。对这一指责,阿忆极为不满,尤其是当阿忆做客凤凰《一虎一席谈》时称“人类社会分出阶层并不可怕,分出阶层利于激励勤勉、鞭策后进,这是资源不足的情况下分配制度的基础,这并不可怕,可怕的是,高阶层对低阶层没有关爱”。此话一出,网友称阿忆的意思就是“要把财富全给精英,让劳动人民饿着”,指责阿忆是北大最无耻的副教授。 辩解:如果不走穴活不下去 阿忆在博客中称每月能从北大得到的工资太少,“如果不想办法增加收入自救,仅凭学校发的那点工资不能活下去”。 阿忆随后在博客中将自己在北大做副教授所得收入一一列出,共计4786元。除公布北大每月给自己的工资,阿忆还像记流水账似的将每月支出一一列出,最后居然为入不敷出。 加入:好友孔庆东力挺阿忆 作为好友,昨日,孔庆东在新浪博客中力挺阿忆,称阿忆那张工资单绝对真实,自己的基本收入跟阿忆差不多。并称自己和阿忆已属幸运,还有许多年轻老师的收入连这个都达不到,每月仅有微薄的2000元。 此外,孔庆东还对阿忆的勇气表示赞赏,表示以前不想说这些,就是不愿意给北大领导丢脸,他自责道:对社会黑暗面过于宽容,远不如阿忆兄的爱憎分明。 网友:北大教授穷不了 对于阿忆和孔庆东将工资公布于众,网络上出现多种声音,有诧异、同情、不解,当然也有不屑与鄙视。 对网友的不理解,孔庆东称这在其意料之中,孔庆东强调自己和阿忆一起公布工资,只是希望公众对事情有客观的了解,仅此而已,绝对没有叫穷的意思,他说道:“所以,当教授利用业余时间做兼职时,请大众不要过多地指责!” 孔庆东 source from http://news.xinhuanet.com/edu/2006-09/21/content_5118290.htm |
|
|
|
|
|
[分享]Crytology + Information Security fields issue.
趁我要離開前,能把有用的東西上傳上來就傳上來,這段時間,大家所獲得的知識與技術都是全球同步及最新的。 不少日本來的博士及韓國的博士都來這做博士後研究。 之後,對不起,我就不敢保證了。 |
|
现在貌似VM无敌了吧,脱壳已经无意义了
Securing Virtual Machine Monitors: What is Needed? Paul Karger (IBM Research - Watson) Friday 06 March 2009, 14:00-15:00 FW26, Computer Laboratory, William Gates Builiding. If you have a question about this talk, please contact Eiko Yoneki. While many people view virtual machine monitors as something special and different, in realty they are just special purpose operating systems. The major difference is that the API to a virtual machine monitor is the instruction set of the virtual machine, while the API to an operating system is a set of system calls to manipulate processes, file systems, perform I/O, etc. To the extent that a particular VMM uses paravirtualization, it begins to look more like a classical operating system than a VMM —and just like operating systems, VMMs can have exploitable security vulnerabilities. This talk will discuss the myths and reality behind virtualization and security, and look at what is needed to build truly secure VMMs. This talk is part of the Computer Laboratory Systems Research Group Seminar series. 我聽過 Paul Karger 的專題演講,看他展示過 VM 環境下的不安全。 我的電腦裡已經找不到他的簡報檔,有興趣者,請自己去找找看。 |
|
[分享]Crytology + Information Security fields issue.
Weaknesses and improvements of an efficient password based remote user authentication scheme usi.pdf (767.9 KB) Weaknesses of the FORK-256 compression function.pdf (232.8 KB) Zheng and Seberry___s public key encryption scheme revisited.pdf (284.5 KB) |
|
[分享]Crytology + Information Security fields issue.
Parallel Authentication and Public-Key Encryption.pdf (220.3 KB) Preimage Attack on Parallel FFT-Hashing.pdf (199.1 KB) Protocols for RFID tag-reader authentication.pdf (615.0 KB) Provable Secure Generalized Signcryption.pdf (256.5 KB) Remark on the One-Time Password Authentication Protocol against Thelf Attacks.pdf (52.0 KB) Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability.pdf (442.9 KB) Robust Final-Round Cache-Trace Attacks Against AES.pdf (259.1 KB) Secret Handshakes from CA-Oblivious Encryption.pdf (209.3 KB) Secret sharing schemes with partial broadcast channels.pdf (240.7 KB) Secure communication between set-top box and smart card in DTV broadcasting.pdf (404.0 KB) Security Analysis of a Password Authenticated Key Exchange Protocol.pdf (176.4 KB) Security enhancement for a dynamic ID-based remote user authentication scheme.pdf (115.7 KB) Security enhancement for a three-party encrypted key exchange protocol against undetectable on-l.pdf (244.4 KB) Security enhancement for the timestamp-based password authentication scheme using smart cards.pdf (272.5 KB) Security of two remote user authentication schemes using smart cards.pdf (281.5 KB) Some remarks on a remote user authentication scheme using smart cards with forward secrecy.pdf (340.2 KB) Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i.pdf (205.1 KB) Some Results on Anonymity in Hybrid Encryption.pdf (498.6 KB) Special block cipher family DN and new generation SNMAC-type hash function family HDN.pdf (927.0 KB) The Cramer-Shoup Strong-RSASignature Scheme Revisited.pdf (213.1 KB) The Design and Analysis of a Hash Ring-iterative Structure.pdf (133.4 KB) The number of transversals in a Latin square.pdf (247.7 KB) The Security of DSA and ECDSA.pdf (224.8 KB) Two Birds One Stone--Signcryption Using RSA.pdf (223.5 KB) Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers .pdf (216.3 KB) Two Secure Remote User Authentication Schemes using Smart Cards.pdf (201.1 KB) Two Trivial Attacks on Trivium.pdf (182.2 KB) Weakness of the Synchro-Difference LKH Scheme for Secure Multicast.pdf (167.1 KB) |
|
[分享]Crytology + Information Security fields issue.
Efficient User Authentication and Key Agreement With Privacy Protection.pdf (153.6 KB) Extended Double-Base Number System with applications to Elliptic Curve Cryptography.pdf (300.7 KB) Extending commutative diagram cryptanalysis to slide, boomerang, rectangle and square attacks.pdf (187.8 KB) Faster and Shorter Password-Authenticated Key Exchange.pdf (297.8 KB) Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper).pdf (393.0 KB) Formal Security Treatments for IBE-to-Signature Transformation--Relations among Security Notions.pdf (262.2 KB) Further attacks and comments on security of two remote user authentication schemes using smart c.pdf (324.0 KB) Further improvement of an efficient password based remote user authentication scheme using smart.pdf (426.8 KB) General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity.pdf (135.5 KB) How To Find Many Collisions of 3-Pass HAVAL.pdf (230.1 KB) ID-based remote authentication with smart cards on open distributed system from elliptic curve c.pdf (197.9 KB) Identity based KCDSA signcryption.pdf (418.5 KB) Impossibility Proofs for RSA Signatures in the Standard Model.pdf (585.0 KB) Improved efficient remote user authentication scheme using smart cards.pdf (337.9 KB) Indexing Information for Data Forensics.pdf (312.2 KB) Invisibility and Anonymity of Undeniable and Confirmer Signatures.pdf (256.4 KB) Key Privacy for Identity Based Encryption.pdf (103.1 KB) Linear Approximating to Integer Addition.pdf (87.4 KB) Low-Cost Elliptic Curve Digital Signature Coprocessor for Smart Cards.pdf (209.5 KB) Man in the Middle Attacks on Bluetooth.pdf (216.6 KB) More efficient and secure remote user authentication scheme using smart cards.pdf (173.4 KB) MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL.pdf (151.8 KB) Multiple Modular Additions and Crossword Puzzle Attack on NLSv2.pdf (220.0 KB) Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards.pdf (439.2 KB) Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on.pdf (441.5 KB) Networked cryptographic devices resilient to capture.pdf (401.1 KB) New Blockcipher Modes of Operation with Beyond the Birthday Bound Security.pdf (240.3 KB) New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC-HMAC Constructions.pdf (251.8 KB) New remote user authentication scheme using smart cards.pdf (330.1 KB) Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions.pdf (223.1 KB) obner Basis Based Cryptanalysis of SHA-1.pdf (447.4 KB) On the (Im-)Possibility of Extending Coin Toss.pdf (417.4 KB) On the Limits of Point Function Obfuscation.pdf (226.9 KB) On the security of a group key agreement protocol.pdf (78.7 KB) On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan.pdf (182.8 KB) Optimized Hash Tree for Authentication in Sensor Networks.pdf (220.8 KB) |
|
[分享]Crytology + Information Security fields issue.
An Efficient ID-based Digital Signature with Message Recovery Based on Pairing.pdf (150.6 KB) An efficient identity-based cryptosystem for end-to-end mobile security.pdf (552.7 KB) An efficient nonce-based authentication scheme with key agreement.pdf (145.8 KB) An Enhanced ID-based Deniable Authentication Protocol on Pairings.pdf (166.1 KB) An enhanced remote login authentication with smart card.pdf (383.6 KB) An enhanced remote user authentication scheme using smart cards.pdf (355.8 KB) An Improved Designated-Verifier Proxy Signature Scheme.pdf (140.6 KB) Analysis of an efficient group key agreement protocol.pdf (89.7 KB) Applications of SAT Solvers to Cryptanalysis of Hash Functions.pdf (177.5 KB) Biometrics Authenticated Key Agreement Scheme.pdf (227.1 KB) Compact Conversion Schemes for the Probabilistic OW-PCA Primitives.pdf (174.4 KB) Computationally Sound Mechanized Proofs of Correspondence Assertions.pdf (414.5 KB) Crossword Puzzle Attack on NLS.pdf (192.4 KB) Cryptanalysis and Improvement of User Authentication Scheme using Smart Cards for Multi-Server E.pdf (229.7 KB) Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map.pdf (342.1 KB) Cryptanalysis and improvement on two efficient remote user authentication scheme using smart car.pdf (227.3 KB) Cryptanalysis of 4-Pass HAVAL.pdf (168.2 KB) Cryptanalysis of a modified remote user authentication scheme using smart cards.pdf (305.1 KB) Cryptanalysis of an involutional block cipher using cellular automata.pdf (101.1 KB) Cryptanalysis of chaotic stream cipher.pdf (178.4 KB) Cryptanalysis of security enhancement for the timestamp-based password authentication scheme usi.pdf (346.5 KB) Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards.pdf (441.9 KB) Cryptanalysis of two password authenticated key exchange protocols based on RSA.pdf (112.4 KB) Cryptanalysis of white box DES implementations.pdf (267.5 KB) Design and Primitive Specification for Shannon.pdf (374.4 KB) Deterministic Authenticated-Encryption--A Provable-Security Treatment of the Key-Wrap Problem.pdf (420.7 KB) Differential Power Analysis of Stream Ciphers.pdf (567.4 KB) Direct Reduction of String (1,2)-OT to Rabin's OT.pdf (99.4 KB) Do We Need to Vary the Constants--(Methodological Investigation of Block-Cipher Based Hash Funct.pdf (333.0 KB) Dynamic Cryptographic Hash Functions.pdf (190.2 KB) Efficient nonce-based remote user authentication scheme using smart cards.pdf (178.4 KB) Efficient Password-Based Group Key Exchange.pdf (184.4 KB) Efficient Short Signcryption Scheme with Public Verifiability.pdf (456.2 KB) Efficient three-party key exchange using smart cards.pdf (352.6 KB) |
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
能力排名:
No.{{ rank_num }}
等 级:
LV{{ rank_lv-100 }}
活跃值:
在线值:
浏览人数:{{ visits }}
最近活跃:{{ last_active_time }}
注册时间:{{ user_info.create_date_jsonfmt }}
勋章
兑换勋章
证书
证书查询 >
能力值