裤子 发表于 2025-3-28 15:45:28

Conference proceedings 2015g China, in May 2015. .The 38 papers presented in this volume were carefully reviewed and selected from 117 submissions. The regular papers are organized in topical sections named: system security, stream cipher, analysis, key exchange protocol, elliptic curve cryptography, authentication, attribute

青石板 发表于 2025-3-28 19:12:02

Operating System Security Policy Hardening via Capability Dependency Graphsisms and the scale of possible configurations are often overwhelming to system administrators and software developers. Therefore, misconfigurations are very common and the security consequences are serious. It is very necessary to detect and eliminate these misconfigurations. We propose an automated

报复 发表于 2025-3-28 22:55:46

http://reply.papertrans.cn/47/4654/465319/465319_43.png

Customary 发表于 2025-3-29 05:01:33

Differential Fault Analysis of Streebognt a fault analysis attack on this new hashing standard. In particular, our attack considers the compression function in the secret key setting where both the input chaining value and the message block are unknown. The fault model adopted is the one in which an attacker is assumed to be able to caus

alleviate 发表于 2025-3-29 08:58:57

Fault Attacks on Stream Cipher Screamnd Jutla in 2002. The known linear distinguishing attack on Scream takes 2. output words and there is no key recovery attack on it, since the .-box used by Scream is key-dependent and complex. Under the assumption that we can inject random byte faults in the same location multiple number of times, t

Dissonance 发表于 2025-3-29 14:39:30

New Related Key Attacks on the RAKAPOSHI Stream Ciphernd potentially scalable design, and is particularly suitable for hardware applications with restricted resources. The RAKAPOSHI stream cipher offers 128-bit security. In this paper, we point out some mistakes existing in the related key attack on RAKAPOSHI by Isobe et al., and propose a new related

可触知 发表于 2025-3-29 18:19:10

Partial Prime Factor Exposure Attacks on RSA and Its Takagi’s Variantosed. Sarkar and Maitra presented a further attack when some bits of the private prime factor . in the modulus . = . are simultaneously revealed and the total number of bits of . and . required to be known is reduced compared to previous partial key exposure attacks. In this paper, for both the stan

泛滥 发表于 2025-3-29 20:36:09

Analysis of Fractional ,mbNAF for Scalar Multiplicationison between fractional .mbNAF and different scalar recoding methods is given. Regardless of memory restraint, it is shown that . improves tree-based double base chain by a factor of 6.8% and 13.2% is Jacobian curves(with efficiency-orient selected parameter . = 3) and inverted Edwards curves respec

媒介 发表于 2025-3-30 01:15:13

On the Effectiveness of Different Botnet Detection Approaches in different stages of their lifecycle. Hence, identifying botnets have become very challenging specifically given that they can upgrade their methodology at any time. In this work, we investigate four different botnet detection approaches based on the technique used and type of data employed. Two

Crumple 发表于 2025-3-30 05:07:18

http://reply.papertrans.cn/47/4654/465319/465319_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Information Security Practice and Experience; 11th International C Javier Lopez,Yongdong Wu Conference proceedings 2015 Springer Internatio