LVAD360 发表于 2025-3-28 18:31:27

http://reply.papertrans.cn/29/2845/284453/284453_41.png

Pruritus 发表于 2025-3-28 19:43:10

http://reply.papertrans.cn/29/2845/284453/284453_42.png

Offensive 发表于 2025-3-29 01:03:33

Hierarchical Identity-Based Encryption Based on SM9y ISO in 2021. But the initial SM9 identification cryptographic algorithm has only a single private key generator (PKG), and the user private key generation and transportation are completed by the PKG. It is not suitable for large-scale networks because the overburdened PKG can affect system securit

可以任性 发表于 2025-3-29 06:25:25

http://reply.papertrans.cn/29/2845/284453/284453_44.png

Anterior 发表于 2025-3-29 08:04:55

SSINsAuth: Fast Batch Handover Authentication Protocol in Space-Sea Integrated Networksrldwide coverage. These constellations serve as the first line of defense in ensuring the information security of SSINs by providing access authentication services to maritime users. However, the rapid orbital movement of LEO satellites results in limited observable duration for fixed maritime users

Haphazard 发表于 2025-3-29 15:24:21

http://reply.papertrans.cn/29/2845/284453/284453_46.png

无效 发表于 2025-3-29 15:40:29

http://reply.papertrans.cn/29/2845/284453/284453_47.png

洞察力 发表于 2025-3-29 20:50:26

UltraCommander: Ultrasonic Side Channel Attack via Browser Extensionsus entities and researchers delve into its potential privacy threats. Simultaneously, the surge in Browser Extensions, prized for their streamlined access to privileged browser resources, adds a layer of convenience while raising a big concern. This work introduces UltraCommander, a kind of cyber at

investigate 发表于 2025-3-30 03:25:00

http://reply.papertrans.cn/29/2845/284453/284453_49.png

并置 发表于 2025-3-30 05:16:19

http://reply.papertrans.cn/29/2845/284453/284453_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Data Security and Privacy Protection; Second International Xiaofeng Chen,Xinyi Huang,Moti Yung Conference proceedings 2025 The Editor(s) (i