易于 发表于 2025-3-28 17:44:26

An Information-Theoretically Secure Threshold Distributed Oblivious Transfer Protocoleceiver from contacting more than . servers..The one-round DOT protocol we propose is information-theoretically secure, allows the receiver to contact . servers or more, and guarantees the sender’s security, even if the receiver corrupts . − 1 servers after having obtained a secret.

Odyssey 发表于 2025-3-28 21:45:04

http://reply.papertrans.cn/47/4654/465385/465385_42.png

受伤 发表于 2025-3-29 01:22:06

http://reply.papertrans.cn/47/4654/465385/465385_43.png

flamboyant 发表于 2025-3-29 04:08:29

DNS Tunneling for Network Penetrations to set up the tunnels. This paper presents a new Metasploit module for integrated penetration testing of DNS tunnels and uses that module to evaluate the potential of DNS tunnels as communication channels set up through standard, existing exploits and supporting many different command-and-control malware modules.

追逐 发表于 2025-3-29 09:04:52

http://reply.papertrans.cn/47/4654/465385/465385_45.png

Frenetic 发表于 2025-3-29 15:16:37

http://reply.papertrans.cn/47/4654/465385/465385_46.png

轻率的你 发表于 2025-3-29 17:00:21

http://reply.papertrans.cn/47/4654/465385/465385_47.png

痛苦一生 发表于 2025-3-29 21:57:07

Conference proceedings 2013ation security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement.

FLAG 发表于 2025-3-30 01:19:25

ML Confidential: Machine Learning on Encrypted Datag algorithm to a computing service while retaining confidentiality of the training and test data. Since the computational complexity of the homomorphic encryption scheme depends primarily on the number of levels of multiplications to be carried out on the encrypted data, we define a new class of mac

SLING 发表于 2025-3-30 04:49:15

http://reply.papertrans.cn/47/4654/465385/465385_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information Security and Cryptology -- ICISC 2012; 15th International C Taekyoung Kwon,Mun-Kyu Lee,Daesung Kwon Conference proceedings 2013