宣传 发表于 2025-3-26 21:30:12

Privacy Preservation of User History GraphIn this paper, we propose new ideas to protect user privacy while allowing the use of a user history graph. We define new privacy notions for user history graphs and consider algorithms to generate a privacy-preserving digraph from the original graph.

健忘症 发表于 2025-3-27 03:17:41

http://reply.papertrans.cn/47/4654/465346/465346_32.png

自恋 发表于 2025-3-27 06:09:35

http://reply.papertrans.cn/47/4654/465346/465346_33.png

pacifist 发表于 2025-3-27 10:02:02

http://reply.papertrans.cn/47/4654/465346/465346_34.png

ingrate 发表于 2025-3-27 14:50:53

http://reply.papertrans.cn/47/4654/465346/465346_35.png

collagenase 发表于 2025-3-27 18:39:42

How to Break EAP-MD5ow table pre-computed with a fixed challenge, which can be done efficiently with great probability through off-line computations. This kind of attack can also be implemented successfully even if the underlying hash function MD5 is replaced with SHA-1 or even SHA-512.

Strength 发表于 2025-3-28 00:28:49

An Efficient Lattice-Based Secret Sharing Constructionpproximation problems in lattices such as ..-approximate SVP. Different to protocols proposed by Pedersen this scheme uses efficient matrix vector operations instead of exponentiation to verify the secret shares.

吗啡 发表于 2025-3-28 03:38:38

http://reply.papertrans.cn/47/4654/465346/465346_38.png

AMPLE 发表于 2025-3-28 06:41:27

http://reply.papertrans.cn/47/4654/465346/465346_39.png

Ataxia 发表于 2025-3-28 12:02:47

http://reply.papertrans.cn/47/4654/465346/465346_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambie; 6th IFIP WG 11.2 Int Ioannis Askoxyla