烧瓶 发表于 2025-3-26 21:29:28

http://reply.papertrans.cn/47/4654/465382/465382_31.png

acetylcholine 发表于 2025-3-27 02:10:20

Security by, and for, Converged Mobile Devicessuse of a stolen device; novel user interfaces that aid in the secure use of such a device; and the design of an access control framework for the variety of authorization scenarios that such a device must accommodate.We also describe our efforts to deploy this technology in a testbed on the Carnegie Mellon campus.

canvass 发表于 2025-3-27 06:41:43

http://reply.papertrans.cn/47/4654/465382/465382_33.png

mendacity 发表于 2025-3-27 12:19:48

http://reply.papertrans.cn/47/4654/465382/465382_34.png

Density 发表于 2025-3-27 16:55:56

http://reply.papertrans.cn/47/4654/465382/465382_35.png

Exonerate 发表于 2025-3-27 18:49:36

http://reply.papertrans.cn/47/4654/465382/465382_36.png

adj忧郁的 发表于 2025-3-27 23:45:08

Dragon: A Fast Word Based Stream Cipherhe heart of Dragon are two highly optimised 8 × 32 s-boxes. Dragon uses simple operations on 32-bit words to provide a high degree of efficiency in a wide variety of environments, making it highly competitive when compared with other word based stream ciphers. The components of Dragon are designed to resist all known attacks.

运气 发表于 2025-3-28 04:33:16

On Private Scalar Product Computation for Privacy-Preserving Data Mining scalar product protocols, one of which was proposed in a leading data mining conference, are insecure. We then describe a provably private scalar product protocol that is based on homomorphic encryption and improve its efficiency so that it can also be used on massive datasets.

不如乐死去 发表于 2025-3-28 07:04:45

http://reply.papertrans.cn/47/4654/465382/465382_39.png

发微光 发表于 2025-3-28 14:19:06

A Method for Distinguishing the Two Candidate Elliptic Curves in CM Methodroperty, we propose a method to check the parity by using the shift product-based polynomial transformation. For a 160-bits prime number as the characteristic, the proposed method carries out the parity check about 20 times faster than the conventional method when 4 divides the characteristic minus 1.
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information Security and Cryptology - ICISC 2004; 7th International Co Choon-sik Park,Seongtaek Chee Conference proceedings 2005 Springer-V