Apogee 发表于 2025-3-25 03:21:55

http://reply.papertrans.cn/25/2407/240614/240614_21.png

BLUSH 发表于 2025-3-25 09:56:43

http://reply.papertrans.cn/25/2407/240614/240614_22.png

下边深陷 发表于 2025-3-25 12:18:44

http://reply.papertrans.cn/25/2407/240614/240614_23.png

Working-Memory 发表于 2025-3-25 18:27:36

http://reply.papertrans.cn/25/2407/240614/240614_24.png

令人不快 发表于 2025-3-25 22:49:45

Distributed and Hash-Based Mixers for User Anonymity on Blockchain,e de-anonymization of users. The work also presents an improved mechanism to protect user anonymity on Blockchain using a hash-based approach. The simulation results demonstrate how a user can make a transaction to their desired destination from addresses unrelated to their own while simultaneously maintaining their anonymity on the network.

表两个 发表于 2025-3-26 02:34:12

Cryptology and Network Security with Machine Learning978-981-99-2229-1Series ISSN 2524-7565 Series E-ISSN 2524-7573

亚当心理阴影 发表于 2025-3-26 07:09:14

d claimed that the protocol is resistant to several attacks in order to satisfy the demands of three-party communication secure. After examining Islam and Basu’s protocol, we find that the PB-3PAKA protocol is vulnerable to dishonest user’s attack, signal leakage attack (SLA).

认识 发表于 2025-3-26 09:52:49

https://doi.org/10.1007/978-981-99-2229-1Public Key Cryptography; Elliptic Curve Cryptography; Post Quantum Cryptography; Lattice Based Cryptogr

WAX 发表于 2025-3-26 14:01:35

http://reply.papertrans.cn/25/2407/240614/240614_29.png

Kidney-Failure 发表于 2025-3-26 20:11:49

http://reply.papertrans.cn/25/2407/240614/240614_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Cryptology and Network Security with Machine Learning; Proceedings of ICCNS Bimal Kumar Roy,Atul Chaturvedi,Sartaj Ul Hasan Conference proc