逗它小傻瓜 发表于 2025-3-28 17:25:36
Prospectives for modelling trust in information security,This paper describes trust in information security as a subjective human belief. On this background, four formal models for trust which have been proposed in the recent years are analysed with the purpose of determining their strong and weak sides. From this we try to define general criteria for the feasibility of modelling trust.臭了生气 发表于 2025-3-28 19:09:37
Analysis and implementation of a formal authorization policy design approach,In , we proposed a formal approach to specify authorization policies and their transformations. In this paper, we discuss the implementation issues of this approach and analyse the complexities of the algorithms introduced.FOR 发表于 2025-3-29 00:23:59
Practical memory checkers for stacks, queues and deques,A memory checker for a data structure provides a method to check that the output of the data structure operations is consistent with the input even if the data is stored on some insecure medium. In无可非议 发表于 2025-3-29 04:43:54
http://reply.papertrans.cn/47/4655/465401/465401_44.png虚情假意 发表于 2025-3-29 08:48:12
http://reply.papertrans.cn/47/4655/465401/465401_45.pnglegitimate 发表于 2025-3-29 11:59:29
978-3-540-63232-0Springer-Verlag Berlin Heidelberg 1997eczema 发表于 2025-3-29 17:47:06
Information Security and Privacy978-3-540-69237-9Series ISSN 0302-9743 Series E-ISSN 1611-3349鞭子 发表于 2025-3-29 23:02:52
,Trusted third parties for secure electronic commerce — Are they needed,发现 发表于 2025-3-30 03:51:17
http://reply.papertrans.cn/47/4655/465401/465401_49.pngmajestic 发表于 2025-3-30 05:40:50
Inefficiency of variant characteristics for substitution-permutation networks with position permutaIt is necessary to emphasize that applying the position permutations in the SPN does not change the type of algorithm; it is still the substitution-permutation network..Differential cryptanalysis of the SPNs with the position permutations can be made with use of so called .. In this paper we show th