取回 发表于 2025-3-25 05:39:31

http://reply.papertrans.cn/24/2306/230514/230514_21.png

个阿姨勾引你 发表于 2025-3-25 07:59:56

http://reply.papertrans.cn/24/2306/230514/230514_22.png

ventilate 发表于 2025-3-25 12:14:36

A Secure Channel Protocol for Multi-Application Smart Cards Based on Public Key Cryptographysecure channel. This paper introduces a public key based cryptographic protocol for secure entity authentication, data integrity and data confidentiality. The proposed secure channel protocol uses a combination of public key, secret key and the main idea behind the Diffie-Hellman key establishment protocols in order to achieve the desired goals.

改进 发表于 2025-3-25 17:10:10

An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruderher types of protocols are designed to protect against. This paper aims to present an extension of typed MSR in order to formally specify the needed message constructors, as well as the capabilities of a Dolev-Yao intruder designed to attack esoteric protocols.

LIMIT 发表于 2025-3-25 21:27:13

http://reply.papertrans.cn/24/2306/230514/230514_25.png

吸引人的花招 发表于 2025-3-26 02:29:26

http://reply.papertrans.cn/24/2306/230514/230514_26.png

黄瓜 发表于 2025-3-26 05:34:27

http://reply.papertrans.cn/24/2306/230514/230514_27.png

协议 发表于 2025-3-26 09:30:12

http://reply.papertrans.cn/24/2306/230514/230514_28.png

不给啤 发表于 2025-3-26 15:11:07

Duo-Onions and Hydra-Onions — Failure and Adversary Resistant Onion Protocolssary trying to break the communication. This is facilitated by the fact that each message is sent through a path of a certain length and a failure in a single point of this path prohibits message delivery. Since the path cannot be too short in order to offer anonymity protection (at least logarithmi

乏味 发表于 2025-3-26 17:43:53

http://reply.papertrans.cn/24/2306/230514/230514_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Communications and Multimedia Security; 8th IFIP TC-6 TC-11 David Chadwick,Bart Preneel Conference proceedings 20051st edition IFIP Intern