Lucubrate 发表于 2025-3-28 16:39:02

: Walking the Privacy Trailserver. In order to provide user-dependent services, service providers may ask the server to compute functions on the users’ data. We propose a new solution to this problem that guarantees data privacy (. an honest-but-curious server cannot access plaintexts), as well as that service providers can c

Abjure 发表于 2025-3-28 22:35:15

DNS-DNS: DNS-Based De-NAT Schemeoriginal IP address, which is often viewed as a privacy feature, making it harder to identify the communication of individuals devices behind the NAT. . is the reverse process: re-identifying communication flowing into and out of the NAT. De-NAT can be used for traffic management, security, and lawf

Insatiable 发表于 2025-3-29 00:38:23

CLEF: Limiting the Damage Caused by Large Flows in the Internet Coreow detection has been previously explored, but the proposed approaches can be used on high-capacity core routers only at the cost of significantly reduced accuracy, due to their otherwise too high memory and processing overhead. We propose CLEF, a new large-flow detection scheme with low memory requ

谄媚于性 发表于 2025-3-29 06:02:59

Towards Video Compression in the Encrypted Domain: A Case-Study on the H264 and HEVC Macroblock Procs, so-called macroblocks, and is mainly divided into four operations: color conversion, Discrete Cosine Transform (DCT), quantization and entropic encoding. This operation is carried out easily on non-encrypted image. In this paper, we consider the case where such an execution is done in the encrypt

auxiliary 发表于 2025-3-29 09:34:45

http://reply.papertrans.cn/25/2406/240596/240596_45.png

gerrymander 发表于 2025-3-29 13:34:49

http://reply.papertrans.cn/25/2406/240596/240596_46.png

construct 发表于 2025-3-29 18:28:32

The Relation Between CENC and NEMO up to the birthday bound. In this work we consider two approaches in literature to improve it to beyond birthday bound security: CENC by Iwata (FSE 2006) and its generalization NEMO by Lefranc et al. (SAC 2007). Whereas recent discoveries on CENC argued optimal security, the state of the art of NEM

VEN 发表于 2025-3-29 22:41:26

On the Efficiency of ZMAC-Type Modesicient and highly secure MAC based on tweakable blockcipher (TBC). . achieves the so-called beyond-birthday-bound security: security up to . TBC calls, using a TBC with the input-block space . and the tweak space . where . is a set with . and is used for tweak separations. In the hash function, the

syncope 发表于 2025-3-30 01:13:30

http://reply.papertrans.cn/25/2406/240596/240596_49.png

photopsia 发表于 2025-3-30 04:50:47

Enhanced Security of Attribute-Based Signatures security of ABS by presenting a strengthened simulation-based privacy definition and the first attribute-based signature functionality in the framework of universal composability (UC). Additionally, we show that the UC definition is equivalent to our strengthened experiment-based security definitio
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Cryptology and Network Security; 17th International C Jan Camenisch,Panos Papadimitratos Conference proceedings 2018 Springer Nature Switze