ALE 发表于 2025-3-26 21:34:19

Proving Key UsageIn the context of a validation server, or more general PKI server, it could be interesting to give the server the possibility to check whether a certain public key was used. We investigate here some possibilities. We also present an escrow system as an application of the technology.

暂停,间歇 发表于 2025-3-27 02:28:12

http://reply.papertrans.cn/47/4653/465286/465286_32.png

Legend 发表于 2025-3-27 08:28:30

Application of Content Computing in Honeyfarmore, CDN also redirect clients in a centralized way which will induce latency in content delivery. This paper describes the ways to improve CDN to make it suitable to use as a routing mechanism for honeyfarm.

Accommodation 发表于 2025-3-27 10:46:08

http://reply.papertrans.cn/47/4653/465286/465286_34.png

逃避现实 发表于 2025-3-27 16:09:28

Impacts of Security Protocols on Real-Time Multimedia Communicationsity protocols on the delay, packet overhead, quality of service, and other features of real-time communications. Some of analytical and experimental results show the suitability of the security protocols.

分解 发表于 2025-3-27 20:51:32

http://reply.papertrans.cn/47/4653/465286/465286_36.png

exclusice 发表于 2025-3-28 01:09:23

A Probabilistic Method for Detecting Anomalous Program Behaviorting the .-th system call from the sequence of system calls of the length .–1. In addition, we show that a correlation between several kinds of system calls can be expressed by using our method, and can characterize a program behavior.

CLAIM 发表于 2025-3-28 04:38:19

http://reply.papertrans.cn/47/4653/465286/465286_38.png

显示 发表于 2025-3-28 07:44:19

http://reply.papertrans.cn/47/4653/465286/465286_39.png

Cardioversion 发表于 2025-3-28 11:52:10

http://reply.papertrans.cn/47/4653/465286/465286_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information Security Applications; 5th International Wo Chae Hoon Lim,Moti Yung Conference proceedings 2005 Springer-Verlag Berlin Heidelbe