Nonthreatening 发表于 2025-3-25 07:08:34

Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocolsn the semi-honest model. In this work, we propose a new class of zero-knowledge proofs, which are tailored for crypto-computing protocols. First, these proofs directly employ properties of the underlying crypto systems and thus many facts have more concise proofs compared to generic solutions. Secon

oxidize 发表于 2025-3-25 09:34:25

http://reply.papertrans.cn/47/4653/465263/465263_22.png

确认 发表于 2025-3-25 11:44:24

http://reply.papertrans.cn/47/4653/465263/465263_23.png

即席 发表于 2025-3-25 19:40:23

http://reply.papertrans.cn/47/4653/465263/465263_24.png

Genteel 发表于 2025-3-25 20:11:52

On Formally Bounding Information Leakage by Statistical Estimationded, and little is known about the input generation mechanism. After introducing a statistical set-up and defining a formal notion of information leakage ., we prove that, in the absence of significant a priori information about the output distribution, no such estimator can in fact exist that does

Alpha-Cells 发表于 2025-3-26 01:05:36

Structure Based Data De-Anonymization of Social Networks and Mobility Tracesased De-Anonymization (DA) framework which iteratively de-anonymizes data with an accuracy guarantee. Then, to de-anonymize data . between the anonymized data and the auxiliary data, we generalize DA to an Adaptive De-Anonymization (ADA) framework. Finally, we examine DA/ADA on mobility traces and s

壁画 发表于 2025-3-26 07:54:27

Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live Forensicsy dump. That’s because such behavior is transient and the snapshot of memory usually doesn’t contain enough information about it. Lack of this information will cause an uncompleted chain of evidence. Although dynamic analysis can trace this behavior by instruction-level analysis, this technique is s

思想 发表于 2025-3-26 08:53:50

http://reply.papertrans.cn/47/4653/465263/465263_28.png

lesion 发表于 2025-3-26 13:19:09

Soundsquatting: Uncovering the Use of Homophones in Domain Squattingatting, an attacker takes advantage of homophones, i.e., words that sound alike, and registers homophone-including variants of popular domain names. We explain why soundsquatting is different from existing domain-squatting attacks, and describe a tool for the automatic generation of soundsquatting d

让空气进入 发表于 2025-3-26 18:39:50

http://reply.papertrans.cn/47/4653/465263/465263_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Information Security; 17th International C Sherman S. M. Chow,Jan Camenisch,Siu Ming Yiu Conference proceedings 2014 Springer International