GRIPE 发表于 2025-3-26 22:56:17

Order-Preserving Encryption for Non-uniformly Distributed Plaintexts, the concept of OPE was introduced in 2004, the first provably-secure OPE scheme was constructed by Boldyreva, Chenette, Lee, and O’Neill at Eurocrypt 2009. The BCLO scheme uses a sampling algorithm for the hypergeometric distribution as a subroutine and maps the Euclidean middle range gap to a doma

向宇宙 发表于 2025-3-27 03:04:47

http://reply.papertrans.cn/47/4653/465288/465288_32.png

Peristalsis 发表于 2025-3-27 06:00:41

http://reply.papertrans.cn/47/4653/465288/465288_33.png

ABIDE 发表于 2025-3-27 12:56:27

http://reply.papertrans.cn/47/4653/465288/465288_34.png

Pessary 发表于 2025-3-27 17:22:01

Rule Indexing for Efficient Intrusion Detection Systems,d classify such malicious activities, Snort, the open-sourced network intrusion detection system, is widely used. Snort examines incoming packets with all Snort rules to detect potential malicious packets. Because the portion of malicious packets is usually small, it is not efficient to examine inco

异端邪说下 发表于 2025-3-27 19:01:27

http://reply.papertrans.cn/47/4653/465288/465288_36.png

BYRE 发表于 2025-3-28 01:23:25

Lightweight Middleware-Based ZigBee Security in Building Energy Management System,oreover, a variety of researches are added to the BEMS, and ZigBee is one of them. Various communication interfaces are used and tested but ZigBee security is relatively in an initial step. Furthermore, if heavyweight middleware is used in ZigBee networks, it could have influence on total system’s p

抒情短诗 发表于 2025-3-28 02:52:46

A Map-Layer-Based Access Control Model,t of them are based on the concept of authorization window. If there are many complex authorizations, we have to define many windows and the processing of evaluation will be time-consuming. This paper presents a new access control model, which supports authorization on map layers. This model also su

恶臭 发表于 2025-3-28 08:51:24

http://reply.papertrans.cn/47/4653/465288/465288_39.png

桉树 发表于 2025-3-28 13:23:06

Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols,his challenge is multiparty computation (MPC), which enables multiple parties, each given a snippet of a secret ., to compute a function .(.) by communicating with each other without revealing .. However, one of the biggest problems with MPC is that it requires a vast amount of communication and thu
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information Security Applications; 12th International W Souhwan Jung,Moti Yung Conference proceedings 2012 Springer-Verlag GmbH Berlin Heid