Definitive 发表于 2025-3-28 17:19:39

http://reply.papertrans.cn/47/4654/465348/465348_41.png

CUR 发表于 2025-3-28 21:22:27

http://reply.papertrans.cn/47/4654/465348/465348_42.png

青春期 发表于 2025-3-29 02:47:47

http://reply.papertrans.cn/47/4654/465348/465348_43.png

截断 发表于 2025-3-29 07:03:43

A Smart Card Implementation of the McEliece PKCp. We describe the main features of the implementation which focuses on performance optimization. We give the resource demands and timings for two sets of security parameters, the higher one being in the secure domain. The timings suggest the usability of the implementation for certain real world ap

Constitution 发表于 2025-3-29 09:25:52

Evaluation Metrics of Physical Non-invasive Securityuation standards, such as U.S. Federal Information Processing Standard (FIPS) 140-3 and Common Criteria (CC) part 3 have added special requirements addressing physical non-invasive security. However, these evaluation standards lack of quantitative metrics to explicitly guide the design and measureme

宽容 发表于 2025-3-29 13:53:09

Trust in Peer-to-Peer Content Distribution Protocolsbased on peer to peer networks like BitTorrent require new approaches to establish the needed level of trust in the overall functionality of the system..This paper explores the integration of hardware based trust concepts from the domain of Trusted Computing in the well know BitTorrent protocol suit

Indecisive 发表于 2025-3-29 18:53:44

http://reply.papertrans.cn/47/4654/465348/465348_47.png

巫婆 发表于 2025-3-29 22:41:24

http://reply.papertrans.cn/47/4654/465348/465348_48.png

strdulate 发表于 2025-3-30 01:31:07

http://reply.papertrans.cn/47/4654/465348/465348_49.png

Figate 发表于 2025-3-30 05:08:43

Practical Schemes for Privacy and Security Enhanced RFIDtead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key search time penalty at the reader. Moreover, they do not allow for dynamic, fine-grained access control to the tag that cater for more complex usage scen
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devic; 4th IFIP WG 11.2 Int Pierangela Samar