dissolution 发表于 2025-3-28 15:39:00

WSACd - A Usable Access Control Framework for Smart Home Devicesteraction smart devices often have with the physical world, along with the processing, storage and communication of private sensitive data pertaining to users’ lives, bring security concerns into the limelight. This paper presents Web Service Access Control for devices (WSACd), a framework that comb

死亡 发表于 2025-3-28 22:49:15

http://reply.papertrans.cn/47/4654/465337/465337_42.png

油膏 发表于 2025-3-29 02:44:45

Practical and Privacy-Preserving TEE Migrationbelong to diverse service providers. Each TA manipulates a profile, constituted of secret credentials and user’s private data. Normally, a user should be able to transfer his TEE profiles from a TEE to another compliant TEE. However, TEE profile migration implies security and privacy issues in parti

Mhc-Molecule 发表于 2025-3-29 03:16:37

Randomizing the Montgomery Powering Ladderide-channel attacks and especially recently published correlation collision attacks in the horizontal setting. The first of these operates by randomly changing state such that the difference between registers varies, unpredictably, between two states. The second algorithm takes a random walk, albeit

Abnormal 发表于 2025-3-29 09:24:53

http://reply.papertrans.cn/47/4654/465337/465337_45.png

Conflict 发表于 2025-3-29 15:17:03

http://reply.papertrans.cn/47/4654/465337/465337_46.png

Obsequious 发表于 2025-3-29 18:47:40

Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confident needs to be confidential. Some passive RFID tags have very limited computational power and can therefore not implement standard cryptographic mechanisms. This has led to several proposals where data sent by the RFID tag is ‘hidden’ by noisy signals generated by the RFID reader. The RFID reader can

Inelasticity 发表于 2025-3-29 20:28:19

http://reply.papertrans.cn/47/4654/465337/465337_48.png

mastoid-bone 发表于 2025-3-30 03:26:41

http://reply.papertrans.cn/47/4654/465337/465337_49.png

Employee 发表于 2025-3-30 04:52:28

http://reply.papertrans.cn/47/4654/465337/465337_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Information Security Theory and Practice; 9th IFIP WG 11.2 Int Raja Naeem Akram,Sushil Jajodia Conference proceedings 2015 IFIP Internation