BRIEF 发表于 2025-3-23 12:12:54

http://reply.papertrans.cn/27/2633/263224/263224_11.png

长处 发表于 2025-3-23 15:17:51

Location Privacy Protection Through Obfuscation-Based Techniques a new wave of applications that manage physical positions of individuals to offer location-based services for business, social or informational purposes. As an effect of such innovative services, however, privacy concerns are increasing, calling for more sophisticated solutions for providing users

wreathe 发表于 2025-3-23 19:24:46

http://reply.papertrans.cn/27/2633/263224/263224_13.png

火花 发表于 2025-3-23 23:25:13

http://reply.papertrans.cn/27/2633/263224/263224_14.png

thalamus 发表于 2025-3-24 05:56:49

http://reply.papertrans.cn/27/2633/263224/263224_15.png

代理人 发表于 2025-3-24 06:30:37

http://reply.papertrans.cn/27/2633/263224/263224_16.png

upstart 发表于 2025-3-24 14:35:27

Measuring the Overall Security of Network Configurations Using Attack Graphssecurity of a network system cannot simply be determined based on the number of vulnerabilities. To quantitatively assess the security of networked systems, one must first understand which and how vulnerabilities can be combined for an attack. Such an understanding becomes possible with recent advan

Root494 发表于 2025-3-24 16:44:50

Enforcing Honesty in Assured Information Sharing Within a Distributed Systemrties attempt to share data, there is not necessarily any guarantee that the participants will share data truthfully. In fact, there is often a large incentive to engage in behavior that can sabotage the effectiveness of such a system. We analyze these situations in light of game theory, a mathemati

modish 发表于 2025-3-24 20:55:43

http://reply.papertrans.cn/27/2633/263224/263224_19.png

Ceremony 发表于 2025-3-25 01:58:51

http://reply.papertrans.cn/27/2633/263224/263224_20.png
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Data and Applications Security XXI; 21st Annual IFIP WG Steve Barker,Gail-Joon Ahn Conference proceedings 2007 IFIP International Federati