高度赞扬 发表于 2025-3-25 03:53:12

Security for Ubiquitous Computing require thorough rethinking.At a higher level still, even goals and policies must be revised. One question we should keep asking is simply “Security for whom?” The owner of a device, for example, is no longer necessarily the party whose interests the device will attempt to safeguard.Ubiquitous comp

Ejaculate 发表于 2025-3-25 11:33:44

Algebraic Attacks on Combiners with Memory and Several Outputs. In practice our result substantially reduces the complexity of the best attack known on four well known constructions of stream ciphers when the number of outputs is increased. We present interesting attacks on modified versions of Snow, E0, LILI-128 and Turing ciphers... An extended version is av

驾驶 发表于 2025-3-25 11:44:36

http://reply.papertrans.cn/47/4654/465382/465382_23.png

Chandelier 发表于 2025-3-25 18:55:43

http://reply.papertrans.cn/47/4654/465382/465382_24.png

萤火虫 发表于 2025-3-25 21:36:45

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465382.jpg

收养 发表于 2025-3-26 01:16:19

http://reply.papertrans.cn/47/4654/465382/465382_26.png

FLAIL 发表于 2025-3-26 07:52:24

On Subliminal Channels in Deterministic Signature Schemes with deterministic schemes. Using some known signature schemes like ESIGN-D and SFLASH. as example, we illustrate the problem of subliminal channels in non-interactive deterministic signature algorithms. Based on anappropriate formalization, a deterministic variant of RSA-PSS is shown to be subliminal free.

TEM 发表于 2025-3-26 09:55:45

978-3-540-26226-8Springer-Verlag Berlin Heidelberg 2005

罗盘 发表于 2025-3-26 15:23:53

http://reply.papertrans.cn/47/4654/465382/465382_29.png

habitat 发表于 2025-3-26 20:20:51

0302-9743 Overview: 978-3-540-26226-8978-3-540-32083-8Series ISSN 0302-9743 Series E-ISSN 1611-3349
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Information Security and Cryptology - ICISC 2004; 7th International Co Choon-sik Park,Seongtaek Chee Conference proceedings 2005 Springer-V