Left-Atrium 发表于 2025-3-26 20:58:26
Establishing big brother using covert channels and other covert techniques, covert hardware and covert software is actually undecidable and cryptography alone seems inadequate to protect against the abuse of covert technology, extending the work of Anderson regarding the limitations of cryptography. Also, the use of covert technology to protect copyright can be abused to suppress freedom of expression.Urea508 发表于 2025-3-27 01:27:01
Modulation and information hiding in images,tion. The theory indicates the most aggressive feasible parameter settings. We also introduce a technique called . for increasing resistance to JPEG compression. Analogous tactics are presumably possible whenever a model of anticipated distortion is available.laceration 发表于 2025-3-27 05:53:11
Conference proceedings 1996e of each other‘s existence. The 26 papers presented define the state of the art and lay the foundation for a common terminology. This workshop is very likely to be seen at some point as one of those landmark events that mark the birth of a new scientific discipline.领巾 发表于 2025-3-27 13:23:35
http://reply.papertrans.cn/47/4651/465059/465059_34.pngcrockery 发表于 2025-3-27 15:45:30
http://reply.papertrans.cn/47/4651/465059/465059_35.png滑动 发表于 2025-3-27 21:21:04
The Newton channel,ign of the DSA does not maximise the covert utility of its signatures, but minimises them. Our construction also shows that many discrete log based systems are insecure: they operate in more than one group at a time, and key material may leak through those groups in which discrete log is easy. However, the DSA is not vulnerable in this way.拥挤前 发表于 2025-3-27 23:38:51
0302-9743 hop is very likely to be seen at some point as one of those landmark events that mark the birth of a new scientific discipline.978-3-540-61996-3978-3-540-49589-5Series ISSN 0302-9743 Series E-ISSN 1611-3349陈腐的人 发表于 2025-3-28 02:48:50
Trials of traced traitors,at he could not have produced on his own, and that is therefore much better evidence. Examples of concrete constructions are given..We also discuss the general model of traitor tracing and propose improvements to the symmetric schemes.割公牛膨胀 发表于 2025-3-28 08:12:21
Modeling cryptographic protocols and their collusion analysis,e and the other the subsequent collusion phase. We derive a necessary and sufficient condition under which such collusion is possible. Based on this characterization we design an algorithm that checks whether the condition is satisfied, and when it is, computes an efficient collusion process.商业上 发表于 2025-3-28 12:00:26
Blind decoding, blind undeniable signatures, and their applications to privacy protection,, undetectability of the decrypted message has both negative and positive aspects: a negative aspect is considered as the problem of spotting the oracle and a positive aspect is applicable to making undeniable signatures blind against the signer.