泄露 发表于 2025-3-26 21:10:54

http://reply.papertrans.cn/47/4655/465483/465483_31.png

熄灭 发表于 2025-3-27 04:02:30

http://reply.papertrans.cn/47/4655/465483/465483_32.png

Insatiable 发表于 2025-3-27 07:00:18

Katerina Fronckova,Pavel Prazak,Antonin Slabypersonal data to corroborate that information, and without allowing the user to be tracked from one interaction to the next. Mercurial signatures are a novel class of anonymous credentials which show good promise as a simple and efficient construction without heavy reliance on zero-knowledge proofs.

金丝雀 发表于 2025-3-27 13:19:17

Dmytro Marchuk,Viktoriia Kovalchuk,Kateryna Stroj,Inna Sugonyakong the ACNs, Tor represents a practical trade-off between offering a reasonable level of anonymity and, simultaneously, an acceptable transmission delay. Due to its practical impact, there is abundant literature on the performance of Tor concerning both communication and security aspects..Recently,

TIGER 发表于 2025-3-27 14:16:21

http://reply.papertrans.cn/47/4655/465483/465483_35.png

hysterectomy 发表于 2025-3-27 19:13:01

Viktor Vlasenko,Sławomir Stemplewski,Piotr Koczurre during the week of November 22-26, 1999. The workshop was organized by the Centre for Systems Security of the Na­ tional University of Singapore. We gratefully acknowledge the financial support from the Singapore National Science and Technology Board under the grant num­ ber RP960668/M. The idea

充气女 发表于 2025-3-27 22:42:14

http://reply.papertrans.cn/47/4655/465483/465483_37.png

RODE 发表于 2025-3-28 04:42:28

http://reply.papertrans.cn/47/4655/465483/465483_38.png

FER 发表于 2025-3-28 10:04:03

http://reply.papertrans.cn/47/4655/465483/465483_39.png

CRUC 发表于 2025-3-28 12:39:36

http://reply.papertrans.cn/47/4655/465483/465483_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information Systems Architecture and Technology: Proceedings of 39th International Conference on Inf; Part II Jerzy Świątek,Leszek Borzemsk