ULCER 发表于 2025-3-23 10:20:39

http://reply.papertrans.cn/47/4654/465345/465345_11.png

Formidable 发表于 2025-3-23 16:53:01

http://reply.papertrans.cn/47/4654/465345/465345_12.png

hankering 发表于 2025-3-23 19:36:02

Lorenzo Cavallaro,Dieter GollmannFast-track conference proceedings of WIST 2013

chlorosis 发表于 2025-3-24 00:19:07

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465345.jpg

PAGAN 发表于 2025-3-24 03:56:29

http://reply.papertrans.cn/47/4654/465345/465345_15.png

organic-matrix 发表于 2025-3-24 08:26:13

http://reply.papertrans.cn/47/4654/465345/465345_16.png

听觉 发表于 2025-3-24 11:32:26

https://doi.org/10.1007/978-3-642-38530-8attacks; computer networks; mobile devices; privacy; socio-technical systems

Confess 发表于 2025-3-24 15:11:07

Multiplicative Homomorphic E-Auction with Formally Provable Securityvantage is obvious and useful in practice: efficient distributed private key generation and thus efficient trust sharing. A long existing problem in homomorphic e-auction, inefficiency of bid validity check, is solved in the new multiplicative homomorphic e-auction scheme in this paper, which employ

subacute 发表于 2025-3-24 19:31:04

http://reply.papertrans.cn/47/4654/465345/465345_19.png

Original 发表于 2025-3-24 23:54:53

http://reply.papertrans.cn/47/4654/465345/465345_20.png
页: 1 [2] 3 4
查看完整版本: Titlebook: Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems; 7th IFIP WG 11.2 Int Lorenzo Cavallaro,Dieter Goll