组装 发表于 2025-3-25 05:24:58

http://reply.papertrans.cn/24/2339/233854/233854_21.png

Paraplegia 发表于 2025-3-25 09:37:59

http://reply.papertrans.cn/24/2339/233854/233854_22.png

Affection 发表于 2025-3-25 12:50:26

Privacy-Preserving, Taxable Bank Accountsanism (which can be extended to a progressive one) and using unlinkable credentials, digital cash, and zero knowledge proofs of knowledge, we present a solution that prevents anyone, even the tax authority, from knowing which accounts belong to which users, or from being able to link any account to another or to purchases or deposits.

evince 发表于 2025-3-25 19:32:24

Formal Analysis of Privacy for Vehicular Mix-Zonesprivacy for such a zone. We give a set of necessary conditions for any mix-zone protocol to preserve privacy. We analyse, using the tool ProVerif, a particular proposal for key distribution in mix-zones, the CMIX protocol. We show that in many scenarios it does not preserve privacy, and we propose a fix.

organism 发表于 2025-3-25 20:37:27

A New Framework for RFID Privacyional framework for RFID privacy in a rigorous and precise manner. Our framework is based on a zero-knowledge (ZK) formulation and incorporates the notions of adaptive completeness and mutual authentication. We provide meticulous justification of the new framework and contrast it with existing

FOIL 发表于 2025-3-26 01:54:52

Readers Behaving Badlytification cards and payment instruments. In this context, public key certificates form the cornerstone of the overall system security. In this paper, we argue that one of the prominent challenges is how to handle revocation and expiration checking of RFID reader certificates. This is an important i

Meander 发表于 2025-3-26 05:34:28

http://reply.papertrans.cn/24/2339/233854/233854_27.png

lymphedema 发表于 2025-3-26 11:37:04

http://reply.papertrans.cn/24/2339/233854/233854_28.png

迅速飞过 发表于 2025-3-26 13:21:32

http://reply.papertrans.cn/24/2339/233854/233854_29.png

一起 发表于 2025-3-26 19:12:30

A Theory of Runtime Enforcement, with Results security-relevant actions and their results. Because previous work could not model monitors transforming results, MRAs capture realistic behaviors outside the scope of previous models. MRAs also have a simple but realistic operational semantics that makes it straightforward to define concrete MRAs.
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Computer Security - ESORICS 2010; 15th European Sympos Dimitris Gritzalis,Bart Preneel,Marianthi Theohari Conference proceedings 2010 Sprin