Incisor 发表于 2025-3-27 00:50:31

http://reply.papertrans.cn/47/4656/465531/465531_31.png

密码 发表于 2025-3-27 02:13:39

Cryptanalysis and the Improvement of Kim et al.’s Password Authentication Schemes-based password authentication scheme. In 2002, Chan and Cheng pointed out that Yang and Shieh’s timestamp-based password authentication scheme is insecure to vulnerable forgery attack. Further, in 2003, Sun and Yeh showed that Yang and Shieh’s both schemes are insecure to vulnerable forgery attack.

Fierce 发表于 2025-3-27 08:25:16

Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasuressmart cards. By analyzing such electromagnetic emanation, eavesdropper will be able to get some information, so it becomes a real threat of information security. In this paper, we show how to estimate amount of information that is leaked as electromagnetic emanation. We assume the area between the I

Repetitions 发表于 2025-3-27 13:03:17

Data Privacy – Problems and Solutionsl protocols and services such as the World Wide Web. The vast amounts of personal information thus available has led to growing concerns about the privacy of their users. In this paper, we briefly discuss some privacy issues that have to be considered to address the new needs and desiderata of today

CLIFF 发表于 2025-3-27 17:19:13

Secure Chaotic Synchronization Using Negative Feedback of Super-Positioned Signalscurity level to be used in real implementations. One of the major threats to such cryptosystems based on chaotic synchronization is the parameter estimation method both in on-line and off-line forms. In this paper we propose a new method of feedback synchronization, in which instead of a single vari

Communicate 发表于 2025-3-27 20:04:03

http://reply.papertrans.cn/47/4656/465531/465531_36.png

Addictive 发表于 2025-3-27 22:03:25

Secure Transaction Management Protocols for MLS/DDBMSthe demand for higher performance and higher availability, database systems have moved from centralized to distributed architectures, and the research in multilevel secure distributed database management systems (MLS/DDBMS) is gaining more and more prominence. Traditional transaction management prot

RALES 发表于 2025-3-28 03:57:37

http://reply.papertrans.cn/47/4656/465531/465531_38.png

Volatile-Oils 发表于 2025-3-28 08:09:34

ion in sustainable development initiatives. The debates have been critical of the supremacy of western scientific knowledge in such initiatives, with some academics asserting that science can be imperialistic, and its application can sometimes lead to social inequity and exclusion. In response, loca

FOVEA 发表于 2025-3-28 12:51:23

Atul Prakasheen environmental governance and environmental management). How can greater knowledge sharing between the many interest groups involved in environmental management and community development projects be devised? This chapter integrates the epistemological (expressed in the applied peoples’ geography)
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information Systems Security; Third International Patrick McDaniel,Shyam K. Gupta Conference proceedings 2007 Springer-Verlag Berlin Heide