可忽略 发表于 2025-3-30 10:39:33

A New Resilient Key Management Protocol for Wireless Sensor Networksproblem in WSN is key management that covers the establishment, distribution, renewing and revocation of cryptographic keys. Several key management protocols were proposed in the literature. Unfortunately, most of them are not resilient to nodes capture. This means that an attacker compromising a no

裙带关系 发表于 2025-3-30 12:30:49

Efficient Use of Random Delays in Embedded Softwarerent manner of generating random delays, that increases the desynchronisation compared to random delays whose lengths are uniformly distributed. It is also shown that it is possible to reduce the time lost due to the inclusion of random delays, while maintaining the increased desynchronisation.

机构 发表于 2025-3-30 18:11:44

Enhanced Doubling Attacks on Signed-All-Bits Set Recodingowever, the issue of efficiency sometimes raises vulnerabilities against side channel attacks (SCAs). In elliptic curve cryptosystems, one of main operations is the scalar multiplication. Thus it must be constructed in safety against SCAs. Recently, Hedabou et al. proposed a signed-all-bits set (sAB

安抚 发表于 2025-3-30 23:17:59

http://reply.papertrans.cn/47/4654/465349/465349_54.png

呼吸 发表于 2025-3-31 04:45:21

Distributed Certified Information Access for Mobile Devicesn matching the query along with a proof that such information are consistent with the actual content of the database. We show that such a primitive can be securely implemented in a distributed fashion. Furthermore, we describe the design principles for a distributed architecture that would allow the

Mangle 发表于 2025-3-31 08:04:59

http://reply.papertrans.cn/47/4654/465349/465349_56.png

颠簸地移动 发表于 2025-3-31 12:04:52

Optimistic Non-repudiation Protocol Analysisrepudiation protocol that avoids altogether the use of session labels. We have specified and analysed this protocol using an extended version of the AVISPA Tool and one important fault has been discovered. We describe the protocol, the analysis method, show two attack traces that exploit the fault a

visual-cortex 发表于 2025-3-31 14:21:10

Secure Remote User Authentication Scheme Using Bilinear Pairingshat Das et al.’s scheme is still vulnerable to an impersonation attack and an off-line password guessing attack. Furthermore, we present an improved authentication scheme based on bilinear computational Diffie-Hellman problem and one-way hash function to the schemes, in order to isolate such problem

MUTE 发表于 2025-3-31 18:40:19

Cryptanalysis of Some Proxy Signature Schemes Without Certificatesng proxy signature schemes without certificates, namely, the Qian and Cao identity-based proxy signature (IBPS) scheme, the Guo . IBPS scheme and the Li . certificateless proxy signature (CLPS) scheme are insecure against universal forgery. More precisely, we show that any user who has a valid publi

心痛 发表于 2025-4-1 01:12:59

Performance Evaluation of Java Card Bytecodesing the performance behaviour of these platforms is becoming crucial. To meet this need, we present in this paper, a benchmark framework that enables performance evaluation at the bytecode level. The first experimental results show that bytecode execution time isolation is possible.
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems; First IFIP TC6 / WG Damien Sauveron,Konst