大沟 发表于 2025-3-23 10:05:43

0302-97432022, held in Taipei, Taiwan, in November 2022...The 33 full papers together with 2 invited papers included in this volume were carefully reviewed and selected from 87 submissions. ..The main goal of the conference is to promote research on new information security technologies, including their app

Electrolysis 发表于 2025-3-23 17:18:35

978-3-031-21279-6Springer Nature Switzerland AG 2022

清醒 发表于 2025-3-23 19:43:39

Information Security Practice and Experience978-3-031-21280-2Series ISSN 0302-9743 Series E-ISSN 1611-3349

揉杂 发表于 2025-3-24 00:24:58

http://reply.papertrans.cn/47/4654/465327/465327_14.png

尖酸一点 发表于 2025-3-24 06:09:17

https://doi.org/10.1007/978-3-031-21280-2access control; artificial intelligence; authentication; computer crime; computer hardware; computer netw

万神殿 发表于 2025-3-24 08:11:20

Towards Blockchain-Enabled Intrusion Detection for Vehicular Navigation Map System the security aspect. The traditional security defense strategies are not enough to cope with the risks faced by the IoV. The mature V2X communication protocols such as C-V2X and DSRC are not widely deployed because they have not reached consensus among telecom operators, vehicle manufacturers, and

output 发表于 2025-3-24 12:59:41

Blockchain-Based Self-Sovereign Identity System with Attribute-Based Issuancever, the inherent transparency of blockchain technology poses a challenge to privacy-conscious applications. To address this challenge, we adopt a DDH-based oblivious transfer and trust execution environment (TEE) to hide users’ private attributes. Furthermore, we propose a concrete system that incl

gangrene 发表于 2025-3-24 16:01:16

http://reply.papertrans.cn/47/4654/465327/465327_18.png

衍生 发表于 2025-3-24 22:31:02

http://reply.papertrans.cn/47/4654/465327/465327_19.png

Biguanides 发表于 2025-3-24 23:27:08

Blockchain-Based Multi-keyword Search on Encrypted COVID-19 Contact Tracing Dataividual. Encryption schemes can be used to ensure confidentiality; however, the usability of the retrieval system will be reduced considerably as the encrypted data does not support searchability. Hence, searchable encryption could be applied to contact tracing data. This paper introduces our implem
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Information Security Practice and Experience; 17th International C Chunhua Su,Dimitris Gritzalis,Vincenzo Piuri Conference proceedings 2022