驳船 发表于 2025-3-30 10:41:48
http://reply.papertrans.cn/47/4654/465396/465396_51.png赏心悦目 发表于 2025-3-30 14:16:46
Decentralized Event Correlation for Intrusion Detection,ct such attacks therefore have to collect and correlate information from different sources. We propose a completely decentralized approach to solve the task of event correlation and information fusing of data gathered from multiple points within the network..Our system models an intrusion as a pattegoodwill 发表于 2025-3-30 18:54:07
Enhancing the Security of Cookies, in a user’s shopping cart to authentication information used for accessing restricted pages. While cookies are clearly very useful, they can also be abused. In this paper, security threats that cookies can pose to a user are identified, as are the security requirements necessary to defeat them. Var吼叫 发表于 2025-3-31 00:46:44
A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation,ack systems and servers by hackers very frequently. Recently, many researches tried to prevent it, and several solutions were developed such as Libsafe and StackGuard; however, these solutions have a few problems. In this paper we present a new stack buffer overflow attack prevention technique that考得 发表于 2025-3-31 02:05:12
http://reply.papertrans.cn/47/4654/465396/465396_55.pngArboreal 发表于 2025-3-31 06:46:48
Binary Codes for Collusion-Secure Fingerprinting,iderations, the pirates’ probablity of success (which must be non-zero, as was shown by Boneh and Shaw) on one hand, and decoding complexity on the other. We show how to minimize the pirates’ probability of success: but the associated decoding complexity is .(. .), where . is the number of users. Necogitate 发表于 2025-3-31 12:50:04
Copyright Protection of Object-Oriented Software,rmarks on three “orthogonal” levels. For the first level, watermarks are injected into objects. The second level watermarking is used to select proper variants of the source code. The third level uses transition function that can be used to generate copies with different functionalities. Generic watMEN 发表于 2025-3-31 16:14:46
http://reply.papertrans.cn/47/4654/465396/465396_58.png使害羞 发表于 2025-3-31 21:02:05
Slide Attacks with a Known-Plaintext Cryptanalysis,yzing on the other part, the key scheduling part, are known. A slide attack is an instance of attacks exploiting the key schedule weakness. In this paper, currently proposed slide attacks can be still enhanced so that all currently published known-plaintext analytic technique can be applied to smallfaultfinder 发表于 2025-3-31 23:49:03
Constructions of Cheating Immune Secret Sharing,submit invalid shares to the combiner. In the second one, the cheaters collectively decide which shares are to be modified so the combiner gets a mixture of valid and invalid shares from the cheaters. The secret scheme is said to be .-cheating immune if any group of . cheaters has no advantage over