不可救药 发表于 2025-4-1 05:07:44

Habib Mahi,Nezha Farhi,Kaouter Labedthem. The problem is similar to both secure sketches and secret sharing, and we show that both can be used as a basis for constructions. Examples of possible applications are granting access without credentials, recovering forgotten passwords and sharing personal data in social networks.

反感 发表于 2025-4-1 07:03:45

https://doi.org/10.1007/978-3-319-19578-0atient care. Are available security models capable of supporting collaborative access where providers are simultaneously modifying a patient’s medical record? To address this question, this paper details collaborative security extensions to NIST RBAC.

Noctambulant 发表于 2025-4-1 12:19:18

http://reply.papertrans.cn/27/2633/263226/263226_63.png
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Data and Applications Security XXIII; 23rd Annual IFIP WG Ehud Gudes,Jaideep Vaidya Conference proceedings 2009 IFIP International Federat