要素 发表于 2025-3-30 11:19:00

http://reply.papertrans.cn/24/2306/230514/230514_51.png

BRIDE 发表于 2025-3-30 16:18:24

http://reply.papertrans.cn/24/2306/230514/230514_52.png

蕨类 发表于 2025-3-30 18:54:45

http://reply.papertrans.cn/24/2306/230514/230514_53.png

Creatinine-Test 发表于 2025-3-30 22:09:19

Surendra Kumar Mishra,Vijay P. Singhsary trying to break the communication. This is facilitated by the fact that each message is sent through a path of a certain length and a failure in a single point of this path prohibits message delivery. Since the path cannot be too short in order to offer anonymity protection (at least logarithmi

者变 发表于 2025-3-31 01:41:56

Surendra Kumar Mishra,Vijay P. Singhed release of attributes and unlinkability between session protocols, but do not address the problem that attributes distributed in this way may be data-mined for features that allow user profiles to be reconstructed..This paper identifies the aggregation problem as the missing element in the protec

闪光你我 发表于 2025-3-31 07:13:02

http://reply.papertrans.cn/24/2306/230514/230514_56.png

COMMA 发表于 2025-3-31 10:33:15

Formation, Degradation, and Mapping,enerated by means of a conventional signature card. The mobile device serves as the card reader, storage device for the document to be signed and as a display for the signature application. The operating system used on the mobile device has thus a pivotal importance to ensure the integrity and accou

最高点 发表于 2025-3-31 15:43:37

Formation, Degradation, and Mapping, a human user or an application. In the last several years, mobile agents have found numerous applications including e-commerce. In most applications, the security of mobile agents is of the utmost importance. This paper gives an overview of the main security issues related to the mobile agent parad

厨师 发表于 2025-3-31 17:57:54

Physical Deterioration of Soil,rlying smart card microprocessors and the complexities introduced by the operation of a PKI infrastructure. In this paper we analyse the significance of public key secure channel protocols in multi-application smart cards. We believe that multi-application smart card technology (e.g. the GlobalPlatf

forecast 发表于 2025-3-31 22:46:55

https://doi.org/10.1007/978-94-007-7590-9horization to mobile devices. We examine how the location of trust agents and secure repositories affects such a system. We also present an implementation of one of these models. This protocol leverages software proxies, autonomous trust agents, and secure repositories to allow portable devices from
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Communications and Multimedia Security; 8th IFIP TC-6 TC-11 David Chadwick,Bart Preneel Conference proceedings 20051st edition IFIP Intern