争吵加 发表于 2025-3-28 17:43:38
The Routing Problem in Computer Networksand a user profile. In this paper, we show how the problem of generating an inference-proof database instance can be represented by the partial maximum satisfiability problem. We present a prototypical implementation that relies on highly efficient SAT-solving technology and study its performance in a number of test cases.Epidural-Space 发表于 2025-3-28 21:54:02
Adriano De Luca,Lelia Giovani,Franco MarraC model to express security policies for spatial applications. We first add to Or-BAC the spatial predicates defined in the OpenGIS Geometry Model . We then show how to model various types of spatial contexts. We finally use these spatial contexts to write security policies for spatial applications.fabricate 发表于 2025-3-29 02:47:20
http://reply.papertrans.cn/27/2630/262995/262995_43.pngSPER 发表于 2025-3-29 04:33:00
https://doi.org/10.1007/978-1-4615-6281-8ing problem. The use of low-overhead procedures becomes the main approach to solve these challenging problems where traditional cryptography cannot fit. Recent results and trends, with an emphasis on lightweight techniques for addressing critical threats against low-cost RFID systems, are surveyed.judiciousness 发表于 2025-3-29 11:01:06
http://reply.papertrans.cn/27/2630/262995/262995_45.pngMindfulness 发表于 2025-3-29 15:18:59
Security Threat Mitigation Trends in Low-Cost RFID Systemsing problem. The use of low-overhead procedures becomes the main approach to solve these challenging problems where traditional cryptography cannot fit. Recent results and trends, with an emphasis on lightweight techniques for addressing critical threats against low-cost RFID systems, are surveyed.ellagic-acid 发表于 2025-3-29 18:10:13
0302-9743 l Workshop on Data Privacy Management, and SETOP 2009, the Second International Workshop on Autonomous and Spontaneous Security, collocated with the ESORICS 2009 symposium in St. Malo, France, in September 2009...The 8 revised full papers for DPM 2009, selected from 23 submissions, presented togetheEnliven 发表于 2025-3-29 21:48:28
http://reply.papertrans.cn/27/2630/262995/262995_48.png自作多情 发表于 2025-3-30 01:36:53
Communications in an era of networksndividual parts of the original data. We show that some perturbation methods do not allow a private distributed extension, whereas other methods do. Among the methods that allow a distributed privacy-preserving version, we can list noise addition, resampling and a new protection method, ., which is described and analyzed here for the first time.难理解 发表于 2025-3-30 04:41:15
https://doi.org/10.1007/978-0-387-35499-6 at the same time. The user identifies himself to the card via biometrics thus forbidding an unauthorized use in the situation where the card is stolen or lost. Two practical implementations of the privacy-preserving identity card are described and discussed.