鸵鸟 发表于 2025-3-26 21:31:05

978-3-030-34338-5Springer Nature Switzerland AG 2019

使成波状 发表于 2025-3-27 04:31:01

Information Security Practice and Experience978-3-030-34339-2Series ISSN 0302-9743 Series E-ISSN 1611-3349

Estrogen 发表于 2025-3-27 06:17:55

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465314.jpg

停止偿付 发表于 2025-3-27 13:19:38

http://reply.papertrans.cn/47/4654/465314/465314_34.png

SEED 发表于 2025-3-27 14:51:02

Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme proposed strategy, the NTT was implemented following the lattice parameters in qTESLA, which is one of the round 2 candidates in NIST Post-Quantum Standardization competition. To the best of our knowledge, this is the first implementation of NTT in GPU with parameters from qTESLA. The proposed impl

Sedative 发表于 2025-3-27 20:44:09

KMO: Kernel Memory Observer to Identify Memory Corruption by Secret Inspection Mechanismtual memory, we present the Kernel Memory Observer (KMO), which has a secret inspection mechanism and offers an alternative design for virtual memory. It allows the detection of illegal data manipulation/writing in the kernel virtual memory. KMO identifies the kernel virtual memory corruption, monit

limber 发表于 2025-3-27 23:36:56

http://reply.papertrans.cn/47/4654/465314/465314_37.png

Cardiac 发表于 2025-3-28 02:51:24

JSLess: A Tale of a Fileless Javascript Memory-Resident Malware not limited to MS PowerShell. In this paper, we designed and implemented a fileless malware by taking advantage of new features in Javascript and HTML5. The proposed fileless malware could infect any device that supports Javascript and HTML5. It serves as a proof-of-concept (PoC) to demonstrate the

确定的事 发表于 2025-3-28 07:03:12

Secure Best Arm Identification in Multi-armed BanditsIn other words, the two properties ensure that the protocol has no security single point of failure. We rely on the partially homomorphic property of the well-known Paillier’s cryptosystem as a building block in our protocol. We prove the correctness of our protocol and we present proof-of-concept e

Eviction 发表于 2025-3-28 12:49:51

http://reply.papertrans.cn/47/4654/465314/465314_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Information Security Practice and Experience; 15th International C Swee-Huay Heng,Javier Lopez Conference proceedings 2019 Springer Nature