NIP 发表于 2025-3-23 12:26:55
http://reply.papertrans.cn/47/4654/465335/465335_11.pngdelegate 发表于 2025-3-23 17:51:58
Credential Disabling from Trusted Execution Environmentsrious applications and services. An important requirement for any credential platform is the ability to . and . credentials. In this paper, we raise the problem of temporary credential disabling from embedded TrEEs and explain why straightforward solutions fall short. We present two novel credentialbarium-study 发表于 2025-3-23 19:03:10
Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications and card users. Since these applications contain sensitive data and can exchange information, a major concern is the assurance that these applications will not exchange data unless permitted by their respective policies. We suggest an approach for load time application certification on the card, th染色体 发表于 2025-3-23 22:49:42
http://reply.papertrans.cn/47/4654/465335/465335_14.png马笼头 发表于 2025-3-24 02:29:58
http://reply.papertrans.cn/47/4654/465335/465335_15.png烤架 发表于 2025-3-24 07:51:16
Security of Web Mashups: A Surveypend on interaction between content from multiple origins and communication with different origins. Contradictory, mashup security relies on separation for protecting code and data. Traditional HTML techniques fail to address both the interaction/communication needs and the separation needs. This pa掺假 发表于 2025-3-24 11:10:25
Safe Wrappers and Sane Policies for Self Protecting JavaScriptealing because it requires neither deep transformation of the code nor browser modification. Unfortunately the implementation outlined suffers from a range of vulnerabilities, and policy construction is restrictive and error prone. In this paper we address these issues to provide a systematic way toCountermand 发表于 2025-3-24 16:09:37
http://reply.papertrans.cn/47/4654/465335/465335_18.pngnautical 发表于 2025-3-24 21:13:51
Secure and Fast Implementations of Two Involution Ciphersime software implementations of Anubis and Khazad for processors with a byte-vector shuffle instruction, such as those that support SSSE3. For Anubis, the first is serial in the sense that it employs only one cipher instance and is compatible with all standard block cipher modes. Efficiency is largeLatency 发表于 2025-3-25 01:36:35
academics, and university administrators.Uses international.This open access book explores the impact of Covid-19 on universities, and how students, staff, faculty and academic leaders have adapted to and dealt with the impact of the pandemic. Drawing on experiences from Britain, Australia and Swed