demote 发表于 2025-3-30 10:29:45

http://reply.papertrans.cn/47/4656/465535/465535_51.png

Glycogen 发表于 2025-3-30 13:13:27

A Robust Reputation Scheme for Decentralized Group Management Systemsmalicious entities. The associated models are based on mathematic formulae, in order to formaly define elements such as the reputation evaluation and evolution and the reputation propagation between peers. Current proposals describe the behaviors of their models by examples, with few (if not no) for

exorbitant 发表于 2025-3-30 19:41:41

http://reply.papertrans.cn/47/4656/465535/465535_53.png

被诅咒的人 发表于 2025-3-30 21:48:59

Secure Internet Voting Based on Paper Ballotsection process making it fast, reliable and inexpensive. Nonetheless, so far the problem of providing security of remote voting is considered to be very difficult, as one has to take into account susceptibility of the voter’s PC to various cyber-attacks. As a result, most of the research effort is p

空中 发表于 2025-3-31 01:22:21

A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper)ty and non-repudiation of digital data over time. Most of the existing timestamping schemes use the notions of round (a period of time) and round token (a single value aggregating the timestamping requests received during one round). Such schemes have the following drawbacks: (i) Clients who have su

Crayon 发表于 2025-3-31 07:15:14

A Framework for Trustworthy Service-Oriented Computing (Short Paper) a service provider’s business model and must execute in a high assurance environment. Increasingly, hardware mechanisms are required to create high-assurance closed environments to host trusted software on open platforms. In current approaches, independent hardware vendors (IHVs) design and impleme

情感脆弱 发表于 2025-3-31 12:21:39

Revisiting Bluetooth Security (Short Paper)vices. As the communication medium is wireless, security is an important concern in this emerging technology. This paper discusses the basic security of Bluetooth technology, some of its shortcomings and presents two new proposals for securing Bluetooth technology. One of the proposals is based on p

撤退 发表于 2025-3-31 16:03:46

http://reply.papertrans.cn/47/4656/465535/465535_58.png

征兵 发表于 2025-3-31 20:30:04

Computing on Encrypted Datamental question give rise to a wide variety of applications. Here, we explore this question in a number of settings, focusing on how interaction and secure hardware can help us compute on encrypted data, and what can be done if we have neither interaction nor secure hardware at our disposal.

外科医生 发表于 2025-3-31 23:40:13

Identification of Cryptographically Strong and Weak Pseudorandom Bit Generatorse security of information is at stack. In this paper we are giving a model which will use confidence interval and multidimentional scaling for their identification. This statistical model can be used to estimate the strength of a new PRBGs.
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Information Systems Security; 4th International Co R. Sekar,Arun K. Pujari Conference proceedings 2008 Springer-Verlag Berlin Heidelberg 20