原谅 发表于 2025-3-23 13:15:46

Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryptionrgue the previous security model is not complete regarding keyword privacy and the previous constructions are secure only in the random oracle model. We solve these problems by first defining a new security model, then give a generic construction which is secure in the new security model without ran

Lumbar-Spine 发表于 2025-3-23 16:39:56

Extended Private Information Retrieval and Its Application in Biometrics Authenticationsformation Retrieval (EPIR). Instead of enabling a user to retrieve a bit (or a block) from a database as in the case of PIR, an EPIR protocol enables a user to evaluate a function . which takes a string chosen by the user and a block from the database as input. Like PIR, EPIR can also be considered

贪婪地吃 发表于 2025-3-23 21:35:25

Strongly Secure Certificateless Public Key Encryption Without Pairingst certificateless encryption (CLPKE) scheme that does not depend on pairing. Although it provides high efficiency, one drawback of their scheme is that the security proof only holds for a weaker security model in which the Type I adversary is not allowed to replace the public key associated with th

身心疲惫 发表于 2025-3-23 23:27:47

Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systlyses the behaviour of packet header field values based on its layer 2, 3 and 4 protocol fields of the ISO OSI Seven Layer Model for Networking. Our model which we call as Protocol based Packet Header Anomaly Detector (PbPHAD) Intrusion Detection System is designed to detect the anomalous behaviour

按时间顺序 发表于 2025-3-24 05:42:28

How to Secure Your Email Address Book and Beyonds scanners, many people (including the authors) constantly receive suspicious emails. Most, if not all, email viruses proliferate by exploiting the email address books on the infected hosts, simply because the address books are not protected by any means whatsoever. In this paper we explore a novel

PLE 发表于 2025-3-24 07:56:43

Toward Non-parallelizable Client Puzzlesbeen proposed in recent years. This paper reviews the desirable properties of client puzzles, pointing out that there is currently no puzzle which satisfies all such properties. We investigate how to provide the property of non-parallelizability in a practical puzzle. After showing that obvious idea

惊惶 发表于 2025-3-24 13:56:11

Anonymity 2.0 – X.509 Extensions Supporting Privacy-Friendly Authenticationtails advantages to both components. On the one hand, anonymous signature schemes benefit from all the protocols and infrastructure that the X.509 framework provides. On the other hand, the X.509 framework incorporates anonymity as a very interesting new feature. This semantic extension is part of a

夹克怕包裹 发表于 2025-3-24 18:23:20

http://reply.papertrans.cn/25/2407/240604/240604_18.png

pacifist 发表于 2025-3-24 21:45:39

http://reply.papertrans.cn/25/2407/240604/240604_19.png

Parley 发表于 2025-3-24 23:57:14

http://reply.papertrans.cn/25/2407/240604/240604_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Cryptology and Network Security; 6th International Co Feng Bao,San Ling,Chaoping Xing Conference proceedings 2007 Springer-Verlag Berlin He