NIP 发表于 2025-3-23 12:26:55

http://reply.papertrans.cn/47/4654/465335/465335_11.png

delegate 发表于 2025-3-23 17:51:58

Credential Disabling from Trusted Execution Environmentsrious applications and services. An important requirement for any credential platform is the ability to . and . credentials. In this paper, we raise the problem of temporary credential disabling from embedded TrEEs and explain why straightforward solutions fall short. We present two novel credential

barium-study 发表于 2025-3-23 19:03:10

Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications and card users. Since these applications contain sensitive data and can exchange information, a major concern is the assurance that these applications will not exchange data unless permitted by their respective policies. We suggest an approach for load time application certification on the card, th

染色体 发表于 2025-3-23 22:49:42

http://reply.papertrans.cn/47/4654/465335/465335_14.png

马笼头 发表于 2025-3-24 02:29:58

http://reply.papertrans.cn/47/4654/465335/465335_15.png

烤架 发表于 2025-3-24 07:51:16

Security of Web Mashups: A Surveypend on interaction between content from multiple origins and communication with different origins. Contradictory, mashup security relies on separation for protecting code and data. Traditional HTML techniques fail to address both the interaction/communication needs and the separation needs. This pa

掺假 发表于 2025-3-24 11:10:25

Safe Wrappers and Sane Policies for Self Protecting JavaScriptealing because it requires neither deep transformation of the code nor browser modification. Unfortunately the implementation outlined suffers from a range of vulnerabilities, and policy construction is restrictive and error prone. In this paper we address these issues to provide a systematic way to

Countermand 发表于 2025-3-24 16:09:37

http://reply.papertrans.cn/47/4654/465335/465335_18.png

nautical 发表于 2025-3-24 21:13:51

Secure and Fast Implementations of Two Involution Ciphersime software implementations of Anubis and Khazad for processors with a byte-vector shuffle instruction, such as those that support SSSE3. For Anubis, the first is serial in the sense that it employs only one cipher instance and is compatible with all standard block cipher modes. Efficiency is large

Latency 发表于 2025-3-25 01:36:35

academics, and university administrators.Uses international.This open access book explores the impact of Covid-19 on universities, and how students, staff, faculty and academic leaders have adapted to and dealt with the impact of the pandemic. Drawing on experiences from Britain, Australia and Swed
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Information Security Technology for Applications; 15th Nordic Conferen Tuomas Aura,Kimmo Järvinen,Kaisa Nyberg Conference proceedings 2012