slipped-disk 发表于 2025-3-25 06:05:16

http://reply.papertrans.cn/24/2339/233856/233856_21.png

ATP861 发表于 2025-3-25 10:45:06

http://reply.papertrans.cn/24/2339/233856/233856_22.png

脆弱么 发表于 2025-3-25 13:16:27

http://reply.papertrans.cn/24/2339/233856/233856_23.png

pester 发表于 2025-3-25 18:19:31

http://reply.papertrans.cn/24/2339/233856/233856_24.png

Curmudgeon 发表于 2025-3-25 21:29:09

Olaf Kühne,Karsten Berr,Corinna Jenalthey are bribed or coerced to reveal themselves or others. Consider e.g. a pharmaceutical company that bribes a pharmacist to reveal information which breaks a doctor’s privacy. In this paper, we identify and formalise several new but important privacy notions on enforcing doctor privacy. Then we an

苦笑 发表于 2025-3-26 01:41:04

http://reply.papertrans.cn/24/2339/233856/233856_26.png

Fibrillation 发表于 2025-3-26 06:10:00

http://reply.papertrans.cn/24/2339/233856/233856_27.png

Infiltrate 发表于 2025-3-26 10:54:20

Hardening Access Control and Data Protection in GFS-like File Systemsider the first complete security analysis of GFS systems. We formalize desirable security properties with respect to the successful enforcement of access control mechanisms and data confidentiality by considering a threat model that is much stronger then in previous works. We propose extensions to t

逢迎白雪 发表于 2025-3-26 13:53:38

Attack of the Clones: Detecting Cloned Applications on Android MarketsDroid achieves this by comparing program dependency graphs between methods in candidate applications. Using DNADroid, we found at least 141 applications that have been the victims of cloning, some as many as seven times. DNADroid has a very low false positive rate — we manually confirmed that all th

开始没有 发表于 2025-3-26 17:00:43

http://reply.papertrans.cn/24/2339/233856/233856_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Computer Security -- ESORICS 2012; 17th European Sympos Sara Foresti,Moti Yung,Fabio Martinelli Conference proceedings 2012 Springer-Verlag