动作谜 发表于 2025-3-27 00:12:18

A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communicationperties. Focusing on the type of communication typified by e-mail, we construct a novel and simple scheme that provides “warrant bounds”, “admissibility”, “surveillance switching”, “non-directive monitoring”, “off-line agency”, “target hiding” and many other useful properties ..

清真寺 发表于 2025-3-27 02:07:10

http://reply.papertrans.cn/47/4655/465404/465404_32.png

壁画 发表于 2025-3-27 07:42:25

PKI Seeks a Trusting Relationshipr party. Digital certificates and public-key infrastructures represent an attempt to mimic real-world human assessment of identity and trustworthiness in an automated and mechanical fashion, but present implementations are based on a very limited trust model making them inadequate as a general tool

连累 发表于 2025-3-27 10:19:39

The PKI Specification Dilemma: A Formal Solutionhe PKI profile that has been proposed for use with the Internet, known as PKIX (PKI using X.509 certificates), to provide a specific example. Our intention is to add value to this and other specifications by providing a more formal description and a framework in which to develop path validation proc

uncertain 发表于 2025-3-27 14:55:42

http://reply.papertrans.cn/47/4655/465404/465404_35.png

Influx 发表于 2025-3-27 18:30:24

http://reply.papertrans.cn/47/4655/465404/465404_36.png

阴郁 发表于 2025-3-28 00:41:04

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465404.jpg

杀菌剂 发表于 2025-3-28 02:21:46

https://doi.org/10.1007/10718964Boolean function; Cryptanalysis; Cryptographic Protocols; Cryptology; Digital Payment; Electronic Commerc

凶兆 发表于 2025-3-28 09:25:47

Security Weaknesses in a Randomized Stream CipherTriStrata appears to have implemented a variation of Maurer’s randomised cipher. We define a variation of Maurer’s cipher that appears to be similar to the TriStrata version, and show several cryptanalytical attacks against our variant.

柔美流畅 发表于 2025-3-28 10:45:52

A Proposal of a New Public Key Cryptosystem Using Matrices over a Ringem is similar to GGH(O. Goldreich, S. Goldwasser, and S. Halevi) cryptosystem but the attack which breaks the GGH system is not applicable to ours. The security of the new construction is based on the computational difficulty of integer factorizations.
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information Security and Privacy; 5th Australasian Con E. P. Dawson,A. Clark,Colin Boyd Conference proceedings 2000 Springer-Verlag Berlin