COUCH 发表于 2025-3-30 10:35:17

Encrypted Watermarks and Linux Laptop Securityloop device, known as CryptoLoop. We demonstrate clear weaknesses in the current CBC-based implementation of CryptoLoop, perhaps the most surprising being a very simple attack which allows specially watermarked files to be identified on an encrypted hard disk without knowledge of the secret encrypti

PTCA635 发表于 2025-3-30 12:29:12

Inconsistency Detection of Authorization Policies in Distributed Component Environmenthereas the components are distributed to an application server on a network with their authorization policies. It is necessary to detect inconsistency between the authorization policies of the RBAC server and the distributed components to guarantee the authorization policy integrity while system con

我们的面粉 发表于 2025-3-30 20:20:03

http://reply.papertrans.cn/47/4653/465286/465286_53.png

返老还童 发表于 2025-3-30 22:44:13

Public Key Encryption with Conjunctive Field Keyword Searchut the document. An email gateway, for example, may be desired to test whether the email contains a keyword “urgent” so that it could route the email accordingly, without leaking any content to the gateway. This mechanism was referred as . . Similarly, a user may want to enable an email gateway t

实现 发表于 2025-3-31 01:49:15

A Probabilistic Method for Detecting Anomalous Program Behaviore order and the kind of system calls. We focus on a non-sequential feature of system calls given from a program. We apply a Bayesian network to predicting the .-th system call from the sequence of system calls of the length .–1. In addition, we show that a correlation between several kinds of system

火花 发表于 2025-3-31 08:21:25

http://reply.papertrans.cn/47/4653/465286/465286_56.png

DEI 发表于 2025-3-31 13:08:34

http://reply.papertrans.cn/47/4653/465286/465286_57.png

美食家 发表于 2025-3-31 15:23:41

http://reply.papertrans.cn/47/4653/465286/465286_58.png

semiskilled 发表于 2025-3-31 20:39:16

http://reply.papertrans.cn/47/4653/465286/465286_59.png

教唆 发表于 2025-3-31 21:47:42

Efficient Authenticated Key Agreement Protocol for Dynamic Groupsed key agreement protocol (EGAKA), which is designed to be fully distributed and fault-tolerant, provides efficient dynamic group membership management, mutual authentication among group members and is secure against both passive and active attacks. The features of EGAKA are as follows: Firstly, EGA
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Information Security Applications; 5th International Wo Chae Hoon Lim,Moti Yung Conference proceedings 2005 Springer-Verlag Berlin Heidelbe