恭维 发表于 2025-3-30 09:00:04

MoteAODV – An AODV Implementation for TinyOS 2.0ety of scenarios ranging from connecting powerful computers to connecting so-called “smart dust” devices. However, the core of MANET technology, the routing protocols, were never designed for the extremely low power devices that are desired for today’s applications. In this paper, we propose a new i

Bph773 发表于 2025-3-30 12:27:11

Random Number Generation Based on Fingerprintsnto key management and cryptography. Methods have been proposed that involve biometric-governed access to cryptographic keys, as well as methods that utilize biometric samples to derive keys for specialized encryption algorithms. The aim of this paper is to present a possible method for random numbe

Aura231 发表于 2025-3-30 16:34:25

Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Ceromoting electronic identification systems among their citizens to enable fully reliable identification. However, in today’s globalized environment, it is becoming more common for citizens and entities of a given country, with their own electronic credentials under the legal framework of their countr

Emg827 发表于 2025-3-30 21:11:12

Fraud Detection for Voice over IP Services on Next-Generation Networksmmunications. These networks carry voice, data, and multimedia traffic over the Internet, providing users with the information they want in any format, amount, device, place or moment. Still, there are certain issues, such as the emerging security risks or the billing paradigms of the services offer

Acetabulum 发表于 2025-3-31 03:50:40

http://reply.papertrans.cn/47/4654/465348/465348_55.png

膝盖 发表于 2025-3-31 05:05:02

Can We Support Applications’ Evolution in Multi-application Smart Cards by Security-by-Contract?s smart cards have remained extremely rare because the business model of the asynchronous download and update of applications by different parties requires the control of interactions among possible applications . the card has been fielded. Yet the current security models and techniques do not suppo

HIKE 发表于 2025-3-31 09:38:38

http://reply.papertrans.cn/47/4654/465348/465348_57.png

按时间顺序 发表于 2025-3-31 13:26:12

Attribute-Based Encryption with Break-Glassng detailed, user-based policies in advance. This makes . in particular interesting for implementing security mechanisms in dynamic environments such as ubiquitous computing, disaster management, or health-care. For supporting the latter two application areas, common . approaches lack one important

甜食 发表于 2025-3-31 19:31:12

http://reply.papertrans.cn/47/4654/465348/465348_59.png

从属 发表于 2025-3-31 22:23:16

http://reply.papertrans.cn/47/4654/465348/465348_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devic; 4th IFIP WG 11.2 Int Pierangela Samar