Amorous 发表于 2025-3-28 17:56:25

A New Resilient Key Management Protocol for Wireless Sensor Networksle polynomial-based key management protocol using a group-based deployment model without any necessary predictable deployment location of nodes. That solution achieves high resilience to nodes compromising compared with other protocols.

鸟笼 发表于 2025-3-28 20:04:28

http://reply.papertrans.cn/47/4654/465349/465349_42.png

debunk 发表于 2025-3-28 23:55:09

http://reply.papertrans.cn/47/4654/465349/465349_43.png

逗它小傻瓜 发表于 2025-3-29 04:01:19

http://reply.papertrans.cn/47/4654/465349/465349_44.png

发炎 发表于 2025-3-29 09:28:48

Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasuresher to skip the error-checking routine, then he can succeed in breaking RSA. In this paper, we show this can be done with the concrete result employing a glitch attack and propose a simple and almost cost-free method to defeat it.

Keratin 发表于 2025-3-29 12:37:58

http://reply.papertrans.cn/47/4654/465349/465349_46.png

欢笑 发表于 2025-3-29 15:39:37

An Embedded System for Practical Security Analysis of Contactless Smartcardsks and carry out security analyses need to be developed. In this contribution, an implementation of a cost-effective, freely programmable ISO 14443 compliant multi function RFID reader and fake transponder is presented that can be employed for several promising purposes.

Obliterate 发表于 2025-3-29 22:39:23

http://reply.papertrans.cn/47/4654/465349/465349_48.png

结构 发表于 2025-3-30 02:52:09

0302-9743 e and ub- uitous. Ensuring the security of these complex and yet resource-constraineds- temshasemergedasoneofthemostpressingchallengesforresearchers.Although there are a number of information security conferences that look at particular aspects of the challenge, we decided to create the Workshop in

联想记忆 发表于 2025-3-30 05:19:25

A Smart Card Based Distributed Identity Management Infrastructure for Mobile Ad Hoc Networksavailable. The mobility of the nodes, in these so called Mobile Ad hoc Networks (MANets), furthermore leads to a situation where it is very difficult to establish secure community-based or even peer to peer communication channels. The basic and major problem that has to be solved is that of identity
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems; First IFIP TC6 / WG Damien Sauveron,Konst