BIPED 发表于 2025-3-23 09:44:01

Flexible Scheduler-Independent Securityopment of a novel scheduler-independent information flow property was the identification of a suitable class of schedulers that covers the most relevant schedulers. The contributions of this article include a novel security property, a scheduler independence result, and a provably sound program analysis.

搜集 发表于 2025-3-23 14:27:19

Secure Multiparty Linear Programming Using Fixed-Point Arithmetic a variant of the simplex algorithm and secure computation with fixed-point rational numbers, optimized for this type of application. We present the main protocols as well as performance measurements for an implementation of our solution.

Delectable 发表于 2025-3-23 19:08:29

http://reply.papertrans.cn/24/2339/233854/233854_13.png

破译密码 发表于 2025-3-24 01:08:35

Sequential Protocol Composition in Maude-NPAation, we are able to analyze and verify this dynamic composition in the current Maude-NPA tool. We prove soundness and completeness of the protocol transformation with respect to the extended operational semantics, and illustrate our results on some examples.

Fulminate 发表于 2025-3-24 05:32:58

https://doi.org/10.1007/978-94-011-0229-2anism (which can be extended to a progressive one) and using unlinkable credentials, digital cash, and zero knowledge proofs of knowledge, we present a solution that prevents anyone, even the tax authority, from knowing which accounts belong to which users, or from being able to link any account to another or to purchases or deposits.

enterprise 发表于 2025-3-24 07:29:39

The Clinical Applications of SPETprivacy for such a zone. We give a set of necessary conditions for any mix-zone protocol to preserve privacy. We analyse, using the tool ProVerif, a particular proposal for key distribution in mix-zones, the CMIX protocol. We show that in many scenarios it does not preserve privacy, and we propose a fix.

出没 发表于 2025-3-24 11:11:59

The Clinical Applications of SPETorks. Finally, based on the protocol of , we propose an efficient RFID mutual authentication protocol and analyze its security and privacy. The methodology used in our analysis can also be applied to analyze other RFID protocols within the new framework.

Anticoagulant 发表于 2025-3-24 16:18:21

http://reply.papertrans.cn/24/2339/233854/233854_18.png

abolish 发表于 2025-3-24 22:05:14

0302-9743 has a tradition that goes back two decades. It tries to bring together the international research community in a top-quality event that covers all the areas of computer security, ranging from theory to applications. ESORICS 2010 was the 15th edition of the event. It was held in Athens, Greece, Septe

恫吓 发表于 2025-3-25 02:56:29

http://reply.papertrans.cn/24/2339/233854/233854_20.png
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Computer Security - ESORICS 2010; 15th European Sympos Dimitris Gritzalis,Bart Preneel,Marianthi Theohari Conference proceedings 2010 Sprin