Invigorate 发表于 2025-3-25 03:54:06

Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agentsms. We show that determining precise points-to analysis in obfuscated programs is NP-hard and the fact provides a theoretical basis for our obfuscation techniques. Furthermore, in this paper we present some empirical experiments, whereby we demonstrate the effectiveness of our approaches.

商品 发表于 2025-3-25 08:38:14

A Security Scheme for Mobile Agent Platforms in Large-Scale Systemstication protocol for the platforms involved, a mobile agent authenticator, and a method for generation of protection domains. It is based on SPKI/SDSI chains of trust, and takes advantage of the flexibility of the SPKI/SDSI certificate delegation infrastructure to provide decentralized authorization and authentication control.

神圣不可 发表于 2025-3-25 14:40:56

Metagenomics for Improving Soil Fertilityhe reaction of the service, privacy critical information may leak to other entities in the chain. It is shown that even simple error messages pose a privacy threat and that proper re-authentication methods should be used instead. Several methods of re-authentication and their impacts on privacy are discussed.

事物的方面 发表于 2025-3-25 16:53:29

https://doi.org/10.1007/978-3-030-71206-8ing the chain linking the client to a given server. This paper defines extensions to the SDSI/SPKI authorization and authentication model, which allow the client to build new chains in order to link it to a server when the corresponding path does not exist.

Cabinet 发表于 2025-3-25 21:29:39

https://doi.org/10.1007/978-3-030-95193-1e of smart cards and smart card readers not yet widely deployed. This requirement limits the mobility and may turn out to be an obstacle to the wide adoption of the digital signature technology. Our work aims precisely at facilitating the adoption of the smart card technology by means of PDAs and mobile phones.

Sciatica 发表于 2025-3-26 00:19:07

http://reply.papertrans.cn/24/2306/230523/230523_26.png

相一致 发表于 2025-3-26 06:11:56

Microbial Goldmine and Organic Farming: ,sion we assess the normalized correlation and Peak Signal to Noise Ratio (PSNR) behavior of the watermarks. We conclude that the proposed systems show improved robustness against compression and provide around 2. possible keys. The security against unauthorized detection is greatly improved.

Flinch 发表于 2025-3-26 10:13:32

http://reply.papertrans.cn/24/2306/230523/230523_28.png

indicate 发表于 2025-3-26 15:58:48

Anthony R. Yeo,Timothy J. Flowersts. The new protocol is analyzed using queuing model, the performance analysis of the new protocol shows that the new protocol has a comparable performance with the Kerberos protocol for short messages and outperforms it for large messages.

可卡 发表于 2025-3-26 18:19:11

https://doi.org/10.1007/978-3-0348-7542-4design, based on interactions with ISP operations personnel and further experience with a prototype implementation are presented, including a heuristic for significantly improving performance. The paper concludes with a comparison of S-BGP to other proposed approaches.
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Communications and Multimedia Security. Advanced Techniques for Network and Data Protection; 7th IFIP TC-6 TC-11 Antonio Lioy,Daniele Mazz