mediocrity
发表于 2025-3-23 10:43:20
Efficient Authentication for Mobile and Pervasive Computingy taking advantage of the fact that the message to be authenticated must also be encrypted, we propose a computationally secure authentication code that is as efficient as an unconditionally secure authentication, without the need for impractically long keys.
离开可分裂
发表于 2025-3-23 16:25:46
http://reply.papertrans.cn/47/4659/465885/465885_12.png
痴呆
发表于 2025-3-23 18:15:05
An Agent-Mediated Fair Exchange Protocoleaving the possible intermediaries out of the scope. In this paper we propose a Fair Exchange protocol for agent-mediated scenarios. We first present our model for agent-mediated scenarios and its requirements, we illustrate its usage with a motivating example, and then we present our proposal with a brief security analysis.
Nonporous
发表于 2025-3-23 23:15:50
Miguel Soriano,Sihan Qing,Javier LópezUnique visibility.State-of-the-art survey.Fast-track conference proceedings
SPECT
发表于 2025-3-24 03:51:04
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465885.jpg
entitle
发表于 2025-3-24 09:36:03
https://doi.org/10.1007/978-3-642-17650-0S-Box; Scantegrity; access control; adaptive security; anonymity; cryptography; integrity; intrusion detect
原始
发表于 2025-3-24 11:46:51
On Practical Second-Order Power Analysis Attacks for Block Ciphers reduced complexity, produce the same result as the original one, without requiring any additional tool. The validity of the proposed variant is confirmed by experiments, whose results allow for a comparison between the two approaches.
slipped-disk
发表于 2025-3-24 17:06:24
978-3-642-17649-4Springer Berlin Heidelberg 2010
发酵剂
发表于 2025-3-24 21:20:57
http://reply.papertrans.cn/47/4659/465885/465885_19.png
圆锥体
发表于 2025-3-24 23:27:23
http://reply.papertrans.cn/47/4659/465885/465885_20.png