CURB 发表于 2025-3-28 17:53:39

http://reply.papertrans.cn/25/2406/240595/240595_41.png

insular 发表于 2025-3-28 19:05:05

http://reply.papertrans.cn/25/2406/240595/240595_42.png

疾驰 发表于 2025-3-29 02:27:29

Benchmarking Secure Multi-party Computation Comparisons for , ’s

placebo-effect 发表于 2025-3-29 04:59:58

Alastair R. Beresford,Arpita Patra,Emanuele Bellin

semiskilled 发表于 2025-3-29 08:24:52

Basic Definitions and Introduction,SHFP records among DNS domain names. We scan the Tranco 1M list and over 500 million names from the certificate transparency log over the course of 26 d. The results show that in two studied populations, about 1 in 10,000 domains has SSHFP records, with more than half of them deployed without using DNSSEC, drastically reducing security benefits.

大酒杯 发表于 2025-3-29 11:31:25

Milestones in the History of Wound Healing, issuance protocol using a two-party computation with an additive homomorphic encryption. At the same time, it keeps the security property of impersonation resilience, anonymity, and unlinkability. Apart from the interactive protocol, we further design the show proofs for efficient single-use credentials which maintain the user anonymity.

愤慨一下 发表于 2025-3-29 18:46:36

http://reply.papertrans.cn/25/2406/240595/240595_47.png

按等级 发表于 2025-3-29 21:36:00

Oh SSH-it, What’s My Fingerprint? A Large-Scale Analysis of SSH Host Key Fingerprint Verification ReSHFP records among DNS domain names. We scan the Tranco 1M list and over 500 million names from the certificate transparency log over the course of 26 d. The results show that in two studied populations, about 1 in 10,000 domains has SSHFP records, with more than half of them deployed without using DNSSEC, drastically reducing security benefits.

PHON 发表于 2025-3-30 01:03:02

Attribute-Based Anonymous Credential: Optimization for Single-Use and Multi-Use issuance protocol using a two-party computation with an additive homomorphic encryption. At the same time, it keeps the security property of impersonation resilience, anonymity, and unlinkability. Apart from the interactive protocol, we further design the show proofs for efficient single-use credentials which maintain the user anonymity.

Reverie 发表于 2025-3-30 04:10:11

http://reply.papertrans.cn/25/2406/240595/240595_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Cryptology and Network Security; 21st International C Alastair R. Beresford,Arpita Patra,Emanuele Bellin Conference proceedings 2022 The Ed