Addictive 发表于 2025-3-26 23:42:52

http://reply.papertrans.cn/47/4653/465266/465266_31.png

魔鬼在游行 发表于 2025-3-27 04:05:43

http://reply.papertrans.cn/47/4653/465266/465266_32.png

pester 发表于 2025-3-27 08:11:34

http://reply.papertrans.cn/47/4653/465266/465266_33.png

紧张过度 发表于 2025-3-27 13:00:35

Generic Forward-Secure Key Agreement Without Signatures secure unauthenticated key agreement scheme (such as standard Diffie–Hellman or Frodo or NewHope). Our construction requires only an IND-CCA public key encryption scheme (such as RSA-OAEP or a method based on ring-LWE), and a message authentication code. Particularly relevant in the context of the

AWL 发表于 2025-3-27 16:31:10

http://reply.papertrans.cn/47/4653/465266/465266_35.png

许可 发表于 2025-3-27 21:24:11

Homomorphic-Policy Attribute-Based Key Encapsulation Mechanismsertext-policy . schemes can choose the policy at the encryption time, contrarily to key-policy . schemes that specify the policy at the key generation time, for each user..In this paper, we define a new property for ., on top of a ciphertext-policy . scheme: homomorphic-policy. A combiner is able to

erythema 发表于 2025-3-27 23:45:34

http://reply.papertrans.cn/47/4653/465266/465266_37.png

Instantaneous 发表于 2025-3-28 02:33:08

http://reply.papertrans.cn/47/4653/465266/465266_38.png

Mirage 发表于 2025-3-28 10:09:24

Improving Gait Cryptosystem Security Using Gray Code Quantization and Linear Discriminant Analysisit templates/models in gait-based authentication systems, they do not take into account the low discriminability and high variation of gait data which significantly affects the security and practicality of the proposed systems. In this paper, we focus on addressing the aforementioned deficiencies in

muffler 发表于 2025-3-28 13:03:17

Low-Level Attacks in Bitcoin Walletslutions for Bitcoin. Within that scope, it is highly recommended that the keys of user accounts are stored offline. To that end, companies provide solutions that range from paper wallets to tamper-resistant smart-cards, offering different level of security. While incorporating expensive hardware for
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Information Security; 20th International C Phong Q. Nguyen,Jianying Zhou Conference proceedings 2017 Springer International Publishing AG 2