原谅 发表于 2025-3-23 13:15:46
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryptionrgue the previous security model is not complete regarding keyword privacy and the previous constructions are secure only in the random oracle model. We solve these problems by first defining a new security model, then give a generic construction which is secure in the new security model without ranLumbar-Spine 发表于 2025-3-23 16:39:56
Extended Private Information Retrieval and Its Application in Biometrics Authenticationsformation Retrieval (EPIR). Instead of enabling a user to retrieve a bit (or a block) from a database as in the case of PIR, an EPIR protocol enables a user to evaluate a function . which takes a string chosen by the user and a block from the database as input. Like PIR, EPIR can also be considered贪婪地吃 发表于 2025-3-23 21:35:25
Strongly Secure Certificateless Public Key Encryption Without Pairingst certificateless encryption (CLPKE) scheme that does not depend on pairing. Although it provides high efficiency, one drawback of their scheme is that the security proof only holds for a weaker security model in which the Type I adversary is not allowed to replace the public key associated with th身心疲惫 发表于 2025-3-23 23:27:47
Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systlyses the behaviour of packet header field values based on its layer 2, 3 and 4 protocol fields of the ISO OSI Seven Layer Model for Networking. Our model which we call as Protocol based Packet Header Anomaly Detector (PbPHAD) Intrusion Detection System is designed to detect the anomalous behaviour按时间顺序 发表于 2025-3-24 05:42:28
How to Secure Your Email Address Book and Beyonds scanners, many people (including the authors) constantly receive suspicious emails. Most, if not all, email viruses proliferate by exploiting the email address books on the infected hosts, simply because the address books are not protected by any means whatsoever. In this paper we explore a novelPLE 发表于 2025-3-24 07:56:43
Toward Non-parallelizable Client Puzzlesbeen proposed in recent years. This paper reviews the desirable properties of client puzzles, pointing out that there is currently no puzzle which satisfies all such properties. We investigate how to provide the property of non-parallelizability in a practical puzzle. After showing that obvious idea惊惶 发表于 2025-3-24 13:56:11
Anonymity 2.0 – X.509 Extensions Supporting Privacy-Friendly Authenticationtails advantages to both components. On the one hand, anonymous signature schemes benefit from all the protocols and infrastructure that the X.509 framework provides. On the other hand, the X.509 framework incorporates anonymity as a very interesting new feature. This semantic extension is part of a夹克怕包裹 发表于 2025-3-24 18:23:20
http://reply.papertrans.cn/25/2407/240604/240604_18.pngpacifist 发表于 2025-3-24 21:45:39
http://reply.papertrans.cn/25/2407/240604/240604_19.pngParley 发表于 2025-3-24 23:57:14
http://reply.papertrans.cn/25/2407/240604/240604_20.png