圆柱 发表于 2025-3-28 15:45:32

http://reply.papertrans.cn/47/4602/460176/460176_41.png

Generalize 发表于 2025-3-28 21:01:06

Reconnection-Based Covert Channels in Wireless Networksion networks. In this paper, we introduce and evaluate two covert channels that utilize reconnections to transmit hidden information in WiFi networks. We implement these covert channels in the 802.11 protocol by abusing the authentication mechanism of these networks. Furthermore, we propose detectio

举止粗野的人 发表于 2025-3-29 00:55:55

Minecraft Altered Skin Channel (MASC)ivacy in a post-encryption environment is to utilize covert channels as a means to hide traffic from monitoring authorities. Covert channels have often been used to hide unwanted or prohibited web traffic, however, the traffic need not be malicious for there to be a necessity for privacy..In this pa

反复拉紧 发表于 2025-3-29 05:24:22

http://reply.papertrans.cn/47/4602/460176/460176_44.png

antipsychotic 发表于 2025-3-29 09:43:27

http://reply.papertrans.cn/47/4602/460176/460176_45.png

未成熟 发表于 2025-3-29 15:29:16

http://reply.papertrans.cn/47/4602/460176/460176_46.png

Veneer 发表于 2025-3-29 16:57:41

RootAsRole: Towards a Secure Alternative to sudo/su Commands for Home Users and SME Administratorsn access control. Other solutions, such as SELinux and AppArmor, are available but complex to use. In this paper, a new Linux module, named RootAsRole, is proposed to allow users to fine-grained control the privileges they grant to Linux commands as capabilities. It adopts a role-based access contro

magnanimity 发表于 2025-3-29 23:43:22

http://reply.papertrans.cn/47/4602/460176/460176_48.png

技术 发表于 2025-3-30 02:27:01

http://reply.papertrans.cn/47/4602/460176/460176_49.png

无弹性 发表于 2025-3-30 07:13:23

http://reply.papertrans.cn/47/4602/460176/460176_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: ICT Systems Security and Privacy Protection; 36th IFIP TC 11 Inte Audun Jøsang,Lynn Futcher,Janne Hagen Conference proceedings 2021 IFIP In