mediocrity 发表于 2025-3-23 10:43:20

Efficient Authentication for Mobile and Pervasive Computingy taking advantage of the fact that the message to be authenticated must also be encrypted, we propose a computationally secure authentication code that is as efficient as an unconditionally secure authentication, without the need for impractically long keys.

离开可分裂 发表于 2025-3-23 16:25:46

http://reply.papertrans.cn/47/4659/465885/465885_12.png

痴呆 发表于 2025-3-23 18:15:05

An Agent-Mediated Fair Exchange Protocoleaving the possible intermediaries out of the scope. In this paper we propose a Fair Exchange protocol for agent-mediated scenarios. We first present our model for agent-mediated scenarios and its requirements, we illustrate its usage with a motivating example, and then we present our proposal with a brief security analysis.

Nonporous 发表于 2025-3-23 23:15:50

Miguel Soriano,Sihan Qing,Javier LópezUnique visibility.State-of-the-art survey.Fast-track conference proceedings

SPECT 发表于 2025-3-24 03:51:04

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465885.jpg

entitle 发表于 2025-3-24 09:36:03

https://doi.org/10.1007/978-3-642-17650-0S-Box; Scantegrity; access control; adaptive security; anonymity; cryptography; integrity; intrusion detect

原始 发表于 2025-3-24 11:46:51

On Practical Second-Order Power Analysis Attacks for Block Ciphers reduced complexity, produce the same result as the original one, without requiring any additional tool. The validity of the proposed variant is confirmed by experiments, whose results allow for a comparison between the two approaches.

slipped-disk 发表于 2025-3-24 17:06:24

978-3-642-17649-4Springer Berlin Heidelberg 2010

发酵剂 发表于 2025-3-24 21:20:57

http://reply.papertrans.cn/47/4659/465885/465885_19.png

圆锥体 发表于 2025-3-24 23:27:23

http://reply.papertrans.cn/47/4659/465885/465885_20.png
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Information and Communications Security; 12th International C Miguel Soriano,Sihan Qing,Javier López Conference proceedings 2010 Springer B