FADE 发表于 2025-3-28 16:31:24

A Key Predistribution Scheme Based on 3-Designs a key predistribution scheme for distributed sensor networks. The secure connectivity and resilience of the resulting sensor network will be analyzed in this paper. This KPS constructed in our paper has some better properties than the ones of KPSs constructed in , and .

adequate-intake 发表于 2025-3-28 18:55:48

Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assu BPK model without assuming .. In our protocol, the resettable zero knowledge is demonstrated via a black-box simulator, while the concurrent soundness is proved by using the malicious prover strategy in . manner.

ADORN 发表于 2025-3-29 01:32:55

Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks implemented by collaboration of . nodes(including at least .. server nodes). Key share distribution, key reconstruction, key share refreshing and recovery are discussed in this paper. The presented protocols improve the availability and enhance the security compared with the existing partially and fully distributed schemes respectively.

音乐学者 发表于 2025-3-29 06:33:52

http://reply.papertrans.cn/47/4654/465364/465364_44.png

引起痛苦 发表于 2025-3-29 07:59:03

http://reply.papertrans.cn/47/4654/465364/465364_45.png

agonist 发表于 2025-3-29 12:07:29

http://reply.papertrans.cn/47/4654/465364/465364_46.png

Magnitude 发表于 2025-3-29 15:37:49

http://reply.papertrans.cn/47/4654/465364/465364_47.png

WITH 发表于 2025-3-29 19:45:19

http://reply.papertrans.cn/47/4654/465364/465364_48.png

影响 发表于 2025-3-30 00:27:19

Raylin Tso,Takeshi Okamoto,Eiji Okamototric frequency declines from its nominal value. This is a highly unwanted situation that limits machine and other power system auxiliaries life time. Contemporary power systems employ conventional load shedding practices as a last resort, in order to achieve frequency stability. However, these pract

Axillary 发表于 2025-3-30 05:36:09

Wei Wu,Yi Mu,Willy Susilo,Xinyi Huangant new risk to the energy sector that were not present in the power grids that operated in isolation. The data that is generated in the smart metering systems can possibly harm its stakeholders. Hence it is important to protect all the stakeholders by providing effective controls to the vulnerable
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Security and Cryptology; Third SKLOIS Confere Dingyi Pei,Moti Yung,Chuankun Wu Conference proceedings 2008 Springer-Verlag Berl