Chandelier 发表于 2025-3-25 18:55:43

http://reply.papertrans.cn/47/4654/465382/465382_24.png

萤火虫 发表于 2025-3-25 21:36:45

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465382.jpg

收养 发表于 2025-3-26 01:16:19

http://reply.papertrans.cn/47/4654/465382/465382_26.png

FLAIL 发表于 2025-3-26 07:52:24

On Subliminal Channels in Deterministic Signature Schemes with deterministic schemes. Using some known signature schemes like ESIGN-D and SFLASH. as example, we illustrate the problem of subliminal channels in non-interactive deterministic signature algorithms. Based on anappropriate formalization, a deterministic variant of RSA-PSS is shown to be subliminal free.

TEM 发表于 2025-3-26 09:55:45

978-3-540-26226-8Springer-Verlag Berlin Heidelberg 2005

罗盘 发表于 2025-3-26 15:23:53

http://reply.papertrans.cn/47/4654/465382/465382_29.png

habitat 发表于 2025-3-26 20:20:51

0302-9743 Overview: 978-3-540-26226-8978-3-540-32083-8Series ISSN 0302-9743 Series E-ISSN 1611-3349

烧瓶 发表于 2025-3-26 21:29:28

http://reply.papertrans.cn/47/4654/465382/465382_31.png

acetylcholine 发表于 2025-3-27 02:10:20

Security by, and for, Converged Mobile Devicessuse of a stolen device; novel user interfaces that aid in the secure use of such a device; and the design of an access control framework for the variety of authorization scenarios that such a device must accommodate.We also describe our efforts to deploy this technology in a testbed on the Carnegie Mellon campus.

canvass 发表于 2025-3-27 06:41:43

http://reply.papertrans.cn/47/4654/465382/465382_33.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Information Security and Cryptology - ICISC 2004; 7th International Co Choon-sik Park,Seongtaek Chee Conference proceedings 2005 Springer-V