pulmonary 发表于 2025-3-25 04:12:07
RSA-Based Certificateless Public Key Encryptionty-Based Cryptography. In this paper, we present a new practical construction of certificateless public key encryption scheme without paring. Our scheme is, in the random oracle model, provably secure under the assumption that the RSA problem is intractable.无所不知 发表于 2025-3-25 10:05:30
On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairingsat a party is indeed the signer for a given signature. In general, the public key of a user needs a management authority to authenticate it. It results in that traditional public key cryptosystem (PKC) requires high maintenance cost for certificate management. Although, identity based cryptosystem (大方一点 发表于 2025-3-25 12:38:55
An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems these phone features. We have implemented a number of attacks and experimented with VoIP services by leading VoIP service providers Vonage, AT&T and Gizmo. Our experimental results demonstrate that a man-in-the-middle or remote attacker could transparently 1) hijack selected E911 calls and impersonCharade 发表于 2025-3-25 18:50:33
Reconstructing a Packed DLL Binary for Static Analysisacked DLLs hinder static code analysis such as disassembly. In this paper, we propose a technique to reconstruct a binary file for static analysis by loading a DLL and triggering and monitoring the execution of the entry-point function and exported functions of packed DLLs. By monitoring all memorydissent 发表于 2025-3-25 21:25:04
http://reply.papertrans.cn/47/4654/465326/465326_25.pngGRILL 发表于 2025-3-26 03:10:38
http://reply.papertrans.cn/47/4654/465326/465326_26.pngCarbon-Monoxide 发表于 2025-3-26 05:49:03
New Constructions for Reusable, Non-erasure and Universally Composable Commitmentsntation is secure in the universally composable paradigm assuming that the decisional Diffie-Hellman problem over a squared composite modulus of the form . =. is hard. Our methodology relies on state-of-the-art double trap-door public-key encryption protocols so that a simulator in charge of a commoforbid 发表于 2025-3-26 10:53:27
http://reply.papertrans.cn/47/4654/465326/465326_28.pngGNAW 发表于 2025-3-26 14:16:26
http://reply.papertrans.cn/47/4654/465326/465326_29.png展览 发表于 2025-3-26 18:47:24
A Novel Adaptive Watermarking Scheme Based on Human Visual System and Particle Swarm Optimizationdiscrete wavelet transform (DWT) and discrete cosine transform (DCT). The secret watermark bits are embedded on the singular values vector of blocks within low frequency subband in host image hybrid DWT-DCT domain. To embed watermark imperceptibly, robustly and securely, we model the adaptive quanti