寡头政治 发表于 2025-3-28 16:17:27
http://reply.papertrans.cn/16/1598/159759/159759_41.png惰性气体 发表于 2025-3-28 22:33:29
A Security Enhanced Key Management Service for ARM Pointer Authenticationrity (CFI) is one of the most effective and popular solution, and integrated with the modish hardware makes it even more valuable, for instance, the ARM Pointer Authentication (PA), which can generate a message authentication code for a pointer and verify it to ensure the pointer is intact. However,沙漠 发表于 2025-3-28 23:22:30
Privacy-Preserving ECC-Based Three-Factor Authentication Protocol for Smart Remote Vehicle Control Sands which allows people to remotely control vehicles through the Internet. However, SVRC’s convenience brings security challenges that the related SRVC’s protocol needs to be enhanced with identity authentication mechanism for both users and their vehicles, in case of illegal intrusion without idenOphthalmologist 发表于 2025-3-29 04:42:55
Efficient and Private Divisible Double Auction in Trusted Execution Environmentxtensively studied. In particular, divisible double auction allows both buyers and sellers to dynamically submit their prices until convergence. However, severe privacy concerns may arise in the double auctions since all the agents may have to disclose their sensitive data such as the bid profiles (评论性 发表于 2025-3-29 09:53:22
Parallel Implementation and Optimization of SM4 Based on CUDAf SM4 is given. Based on the characteristics of CUDA (Compute Unified Device Architecture), a CPU-GPU (Central Processing Unit-Graphics Processing Unit) scheme of SM4 is proposed by exploiting the structure property. Moreover, this scheme is further improved by introducing the page-locked memory and暗指 发表于 2025-3-29 13:21:11
Another Algebraic Decomposition Method for Masked Implementationation of block ciphers has been attracting active research. It is an obstacle to efficient masked implementation that the complexity of an evaluation of multiplication is quadratic in the order of masking. A direct approach to this problem is to explore methods to reduce the number of multiplication破裂 发表于 2025-3-29 18:06:15
http://reply.papertrans.cn/16/1598/159759/159759_47.pnggregarious 发表于 2025-3-29 23:21:36
MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile Devicesged in the mobile devices. To protect sensitive data, encryption is often used but, traditional encryption is vulnerable to coercive attacks in which the device owner is coerced by the adversary to disclose the decryption key. To defend against the coercive attacks, Plausibly Deniable Encryption (PD盖他为秘密 发表于 2025-3-30 03:42:01
Recent Advances in the Web PKI and the Technical Challenges in SCMSadvances in the Web PKI include certificate transparency and push-based revocation, which improve the trustworthiness and performance of TLS and HTTPS, respectively. Meanwhile, SCMS is a specialized PKI system designed for V2V communications. In this paper, we analyze the design principles of certif门窗的侧柱 发表于 2025-3-30 07:33:28
A Thieves Identification Scheme for Prepaid Systems in Smart Gridsals from an operation center before consumption. According to the credentials, consumers can use the corresponding amount of electricity. Based on the dynamic .-times anonymous authentication protocol, the scheme can achieve thieves identification and privacy preservation at the same time without th