首页
社区
课程
招聘
XOR_password ( cc0-95 ) 96 篇論文--請幫忙更改檔名。
发表于: 2009-9-23 09:54 7447

XOR_password ( cc0-95 ) 96 篇論文--請幫忙更改檔名。

2009-9-23 09:54
7447

cc0-95.part05.rar (4.50 MB)
cc0-95.part06.rar (4.50 MB)
cc0-95.part07.rar (4.50 MB)
cc0-95.part08.rar (4.50 MB)
cc0-95.part09.rar (4.50 MB)
cc0-95.part10.rar (4.50 MB)
cc0-95.part11.rar (4.50 MB)
cc0-95.part12.rar (4.50 MB)
cc0-95.part13.rar (4.50 MB)
cc0-95.part14.rar (4.50 MB)
cc0-95.part15.rar (431.7 KB)


[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)

上传的附件:
收藏
免费 7
支持
分享
最新回复 (5)
雪    币: 2096
活跃值: (100)
能力值: (RANK:420 )
在线值:
发帖
回帖
粉丝
2
cc0-95.part03.rar (4.50 MB)
上传的附件:
2009-9-23 10:15
0
雪    币: 2096
活跃值: (100)
能力值: (RANK:420 )
在线值:
发帖
回帖
粉丝
3
cc0-95.part04.rar (4.50 MB)
cc0-95.part01.rar (4.50 MB)
cc0-95.part02.rar (4.50 MB)
上传的附件:
2009-9-23 10:35
0
雪    币: 296
活跃值: (89)
能力值: ( LV15,RANK:340 )
在线值:
发帖
回帖
粉丝
4
有几篇名字看起来不错,这是 XOR_password (另外的 96 篇 papers) cc0-95 中 sdarticle.pdf,sdarticle[0].pdf 到 sdarticle[29].pdf 的31个文件

Applications of tripled chaotic maps in cryptography
Cryptanalysis of a cryptographic scheme based on delayed chaotic neural networks
Analysis and improvement of a chaos-based image encryption algorithm
Efficient image or video encryption based on spatiotemporal chaos system
Logistic chaotic maps for binary numbers generations
A novel chaotic block cryptosystem based on iterating map with output-feedback
A novel image authentication scheme based on hyper-chaotic cell neural network
A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator
An options-based solution to the sequential auction problem
Cryptanalysis and improvement on a cryptosystem based on a chaotic map
A more efficient and secure dynamic ID-based remote user authentication scheme
More secure remote user authentication scheme
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
Security flaw of Hölbl et al.'s protocol
Agent mobility architecture based on IEEE-FIPA standards
Modified clock-controlled alternating step generators
Convertible multi-authenticated encryption scheme with one-way hash function
Reputation management algorithms for DHT-based peer-to-peer environment
New voter verification scheme using pre-encrypted ballots
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard
Area and time efficient AB2 multipliers based on cellular automata
On the security of a copyright protection scheme based on visual cryptography
LAMED — A PRNG for EPC Class-1 Generation-2 RFID specification
Formal apparatus for measurement of lightweight protocols
Software describing attributes
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
Using empirical mode decomposition for iris recognition
An improved smart card based password authentication scheme with provable security
Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
Cryptanalysis of two three-party encrypted key exchange protocols
Explaining instance classifications with interactions of subsets of feature values

发现名字太长了会被截断,贴一遍名字
上传的附件:
2009-9-23 21:16
0
雪    币: 296
活跃值: (89)
能力值: ( LV15,RANK:340 )
在线值:
发帖
回帖
粉丝
5
cc0-95 的 sdarticle[30].pdf 到 sdarticle[59].pdf ,看到好的自己 Ctrl+F 吧

A fuzzy c-means clustering-based fragile watermarking scheme for image authentication
Web-based mobile robot platform for real-time exercises
Image copyright protection with forward error correction
Malicious web content detection by machine learning
A grid middleware for data management exploiting peer-to-peer techniques
A P2P strategy for QoS discovery and SLA negotiation in Grid environment
Robust dual watermarking algorithm for AVS video
Face recognition with disguise and single gallery images
On the security defects of an image encryption scheme
Efficient and Robust Segmentation of Noisy Iris Images for Non-cooperative Iris Recognition
The lower bounds on the second order nonlinearity of three classes of Boolean functions with high nonlinearity
Activity labeling in process modeling: Empirical insights and recommendations
An efficient common-multiplicand-multiplication method to the Montgomery algorithm for speeding up exponentiation
Dynamic Web Service discovery architecture based on a novel peer based overlay network
Discovering vulnerabilities in control system human–machine interface software
Design and implementation of S-MARKS: A secure middleware for pervasive computing applications
Fast point multiplication on Koblitz curves: Parallelization method and implementations
A security approach for off-chip memory in embedded microprocessor systems
Nonlinear electronic circuit—PART II—synchronization in a chaotic MODEM scheme
Parallel keyed hash function construction based on chaotic neural network
A comment on“Sharing secrets in stegoimages with authentication”
Sharing a verifiable secret image using two shadows
Robust palmprint verification using 2D and 3D features
Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator
Improved throughput bit-serial multiplier for GF(2m) fields
An embedded, FPGA-based computer graphics coprocessor with native geometric algebra support
Vulnerability modeling of cryptographic hardware to power analysis attacks
Hardware assisted watermarking for multimedia
Dual-rail transition logic: A logic style for counteracting power analysis attacks
上传的附件:
2009-9-23 22:07
0
雪    币: 296
活跃值: (89)
能力值: ( LV15,RANK:340 )
在线值:
发帖
回帖
粉丝
6
cc0-95 的 sdarticle[60].pdf 到 sdarticle[95].pdf

Design and analysis of a highly secure stream cipher based on linear feedback shift register
A versatile Montgomery multiplier architecture with characteristic three support
An EDA tool for implementation of low power and secure crypto-chips
An efficient cryptosystem Delta for stream cipher applications
A blind image detection method for information hiding with double random-phase encoding
Securing multiplexed information by in-plane rotation of random phase diffusers constituting a sandwich diffuser placed in the Fourier plane of a double random phase encoding system
Determination of optimal parameters for detecting the existence of secret information hidden by the double random-phase encoding technique
Experimental determination of Ra mineral/melt partitioning for feldspars and Ra-disequilibrium crystallization ages of plagioclase and alkali-feldspar
An oblique-matrix technique for data integrity assurance
Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions
Reducing threats from flawed security APIs: The banking PIN case
A business process gap detecting mechanism between information system process flow and internal control flow
The empirical analysis of theN-bilateral optimized combinatorial auction model
A double-sided multiunit combinatorial auction for substitutes: Theory and algorithms
A look at Portable Document Format vulnerabilities
fP2P–HN: A P2P-based route optimization architecture for mobile IP-based community networks
H-P2PSIP: Interconnection of P2PSIP domains for global multimedia services based on a hierarchical DHT overlay network
Optimal node-selection algorithm for parallel download in overlay content-distribution networks
Biofuel cell controlled by enzyme logic network — Approaching physiologically regulated devices
Robust combination rules for evidence theory
Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals
Computationally sound implementations of equational theories against passive adversaries
A policy-based authorization model for workflow-enabled dynamic process management
Design, implementation, and evaluation of a Programmable Bandwidth Aggregation System for home networks
A pixel-based scrambling scheme for digital medical images protection
BitDew: A data management and distribution service with multi-protocol file transfer and metadata abstraction
A fuzzy-based interleaved multi-hop authentication scheme in wireless sensor networks
Enhancing data security in ad hoc networks based on multipath routing
A new substitution–diffusion based image cipher using chaotic standard and logistic maps
A block cipher with dynamic S-boxes based on tent map
Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption
Secure median computation in wireless sensor networks
Rewriting Techniques in the Constraint Solver
Implementing BitLocker Drive Encryption for forensic analysis
Design of highly efficient elliptic curve crypto-processor with two multiplications over GF(2_163)
Arithmetic computation using self-assembly of DNA tiles: subtraction and division

原来上传这些文件比改名更累
上传的附件:
2009-9-23 22:43
0
游客
登录 | 注册 方可回帖
返回
//