机械 发表于 2025-3-30 08:49:51

http://reply.papertrans.cn/47/4654/465313/465313_51.png

发誓放弃 发表于 2025-3-30 13:35:30

http://reply.papertrans.cn/47/4654/465313/465313_52.png

吼叫 发表于 2025-3-30 18:33:19

A Novel Verifiably Encrypted Signature Scheme Without Random Oraclepropose a novel verifiably encrypted signature scheme without random oracles, and show that the security of the scheme is based on the difficulty of solving the Chosen-Target-Inverse-CDH with square problem. By comparing our scheme with Boneh . scheme and S.Lu . scheme, we show that our proposed sch

Diskectomy 发表于 2025-3-30 21:55:00

http://reply.papertrans.cn/47/4654/465313/465313_54.png

感情脆弱 发表于 2025-3-31 02:12:08

http://reply.papertrans.cn/47/4654/465313/465313_55.png

LASH 发表于 2025-3-31 08:55:37

On the Sequentiality of Three Optimal Structured Multisignature Schemesce with a specified signing order. In this paper, we find that three optimal structured multisignature schemes cannot keep sequentiality since they cannot prevent partial signers producing a valid partial multisignature in a signing order different from the specified one. Hence, verifies cannot iden

–FER 发表于 2025-3-31 10:45:05

Secure Feedback Service in Wireless Sensor Networksands). One straightforward way to do so is to let every sensor node send an authenticated acknowledgement (ACK) to the BS directly. However this naive solution is highly communication inefficient and may result in severe ACK implosion near the BS. In this paper, we propose a communication efficient

liaison 发表于 2025-3-31 14:21:03

http://reply.papertrans.cn/47/4654/465313/465313_58.png

玉米 发表于 2025-3-31 18:23:54

Practical Uses of Virtual Machines for Protection of Sensitive User Data the systems. This paper presents Vault - a system that uses a trusted software component to prevent the exposure and abuse of sensitive user data in the presence of malware. Users input and store their sensitive data only in the trusted component, which is separated from the commodity system by a v

molest 发表于 2025-4-1 00:21:06

http://reply.papertrans.cn/47/4654/465313/465313_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Information Security Practice and Experience; Third International Ed Dawson,Duncan S. Wong Conference proceedings 2007 Springer-Verlag Ber