称赞 发表于 2025-3-30 11:41:36

T-out-of-n Distributed Oblivious Transfer Protocols in Non-adaptive and Adaptive Settingsin one out of two secrets held by a sender. In its generalized version presented by Blundo, D’Arco, De Santis, and Stinson, a receiver can choose one out of . secrets..In this paper, we introduce three unconditionally secure DOT protocols which allow a receiver to obtain . out of . secrets..The firs

特征 发表于 2025-3-30 13:47:38

A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions as in the paradigm proposed in . We also show that the protocol is computationally secure against passive and active adversaries. To our knowledge, this is the first practical code-based . protocol. The proposed protocol is compared with some existing number-theoretic . protocols for efficien

Sigmoidoscopy 发表于 2025-3-30 20:30:00

Towards Fine-Grained Access Control on Browser Extensionsun time by means of restricting the access to resources, in order to prevent the malicious JSEs from ruining users security. The resource access of a JSE, which constrains its behavior, is the basis of the functionalities of it. Instead of the conventional static access control rules, we formulate t

entreat 发表于 2025-3-30 20:50:33

Enhanced STE3D-CAP: A Novel 3D CAPTCHA Familys a standard security countermeasure against Internet attacks such as distributed denial of service attacks and botnets. However, many CAPTCHA schemes themselves have been found to be susceptible to automated attacks. The task of designing a good CAPTCHA scheme is still an open and challenging quest

Lipoma 发表于 2025-3-31 02:13:09

High-Entropy Visual Identification for Touch Screen Devicesed, highly entropic data suitable for use as (part of) a strong secret key from a user’s act of identifying to the device. Our system uses visual cryptography , using no additional electronics and no memorization on the part of the user. Instead, we require the use of a transparency overlaid on

GUILT 发表于 2025-3-31 06:50:09

A Framework for Security Analysis of Key Derivation Functionstographic keys from a private seed value where the derived cryptographic keys are indistinguishable from random binary strings. We form a framework of five security models for KDFs. This consists of four security models that we propose: Known Public Inputs Attack (KPM, KPS), Adaptive Chosen Context

指数 发表于 2025-3-31 11:48:25

http://reply.papertrans.cn/47/4654/465318/465318_57.png

拉开这车床 发表于 2025-3-31 14:15:00

http://reply.papertrans.cn/47/4654/465318/465318_58.png

摇曳的微光 发表于 2025-3-31 19:03:12

Lightweight Integrity for XOR Network Coding in Wireless Sensor Networksbefore spreading the pollution in the XOR network coding systems. In order to perform such filtering, two or more message authentication codes (MACs) are used for this scheme. However, Yu’s scheme has a problem that the number of MACs increases at every coding point, since it cannot operate MACs wit

ALTER 发表于 2025-3-31 22:19:01

http://reply.papertrans.cn/47/4654/465318/465318_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Information Security Practice and Experience; 8th International Co Mark D. Ryan,Ben Smyth,Guilin Wang Conference proceedings 2012 Springer-