Dissonance 发表于 2025-3-28 18:05:27

Conference proceedings 2005 was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum for new conceptual and - perimental research

tic-douloureux 发表于 2025-3-28 21:38:52

http://reply.papertrans.cn/47/4653/465286/465286_42.png

榨取 发表于 2025-3-29 01:33:52

Inconsistency Detection of Authorization Policies in Distributed Component Environmentfiguration and policies are changing. In this paper, an inconsistency detection method between the two authorization policies is proposed. Conditions of guaranteeing consistency are investigated to detect the inconsistencies and validated in a case study.

Pathogen 发表于 2025-3-29 05:06:39

Public Key Encryption with Conjunctive Field Keyword Searcho search keywords ., such as “urgent” email from “Bob” about “finance”, without leaking anything else about the email. We refer to this mechanism as .. In this paper, we define the security model of this mechanism and propose two efficient schemes whose security is proved in the random oracle model.

不愿 发表于 2025-3-29 10:13:53

IDS False Alarm Filtering Using KNN Classifierns of IDSs and detect anomaly from incoming alarm streams using k-nearest-neighbor classifier. Preliminary experiments show that our approach successfully reduces up to 93% of false alarms generated by a famous IDS.

案发地点 发表于 2025-3-29 14:00:25

Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarkingeometric distortions, and illumination changes of the image. Through experiments, we will compare the proposed method with representative content-based approaches and show the appropriateness for robust watermarking.

口味 发表于 2025-3-29 17:46:56

http://reply.papertrans.cn/47/4653/465286/465286_47.png

Cleave 发表于 2025-3-29 23:37:51

0302-9743 rea during August 23-25, 2004. The workshop was sponsored by the Korea Institute of Information Security and Cryptology (KIISC), the Electronics and Telecommunications Research Institute (ETRI) and the Ministry of Information and Communication (MIC). The aim of the workshop is to serve as a forum fo

ATRIA 发表于 2025-3-30 01:35:49

http://reply.papertrans.cn/47/4653/465286/465286_49.png

壮观的游行 发表于 2025-3-30 04:57:42

An Improvement on Privacy and Authentication in GSM for GSM has some drawbacks . We show why drawbacks occur and propose an improvement on privacy and authentication in GSM not only to improve drawbacks but also to achieve the goals as follows: mutual authentication, reduction of bandwidth consumption between VLR and HLR, reduction of storage s
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Security Applications; 5th International Wo Chae Hoon Lim,Moti Yung Conference proceedings 2005 Springer-Verlag Berlin Heidelbe