mediocrity 发表于 2025-3-23 10:43:20
Efficient Authentication for Mobile and Pervasive Computingy taking advantage of the fact that the message to be authenticated must also be encrypted, we propose a computationally secure authentication code that is as efficient as an unconditionally secure authentication, without the need for impractically long keys.离开可分裂 发表于 2025-3-23 16:25:46
http://reply.papertrans.cn/47/4659/465885/465885_12.png痴呆 发表于 2025-3-23 18:15:05
An Agent-Mediated Fair Exchange Protocoleaving the possible intermediaries out of the scope. In this paper we propose a Fair Exchange protocol for agent-mediated scenarios. We first present our model for agent-mediated scenarios and its requirements, we illustrate its usage with a motivating example, and then we present our proposal with a brief security analysis.Nonporous 发表于 2025-3-23 23:15:50
Miguel Soriano,Sihan Qing,Javier LópezUnique visibility.State-of-the-art survey.Fast-track conference proceedingsSPECT 发表于 2025-3-24 03:51:04
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465885.jpgentitle 发表于 2025-3-24 09:36:03
https://doi.org/10.1007/978-3-642-17650-0S-Box; Scantegrity; access control; adaptive security; anonymity; cryptography; integrity; intrusion detect原始 发表于 2025-3-24 11:46:51
On Practical Second-Order Power Analysis Attacks for Block Ciphers reduced complexity, produce the same result as the original one, without requiring any additional tool. The validity of the proposed variant is confirmed by experiments, whose results allow for a comparison between the two approaches.slipped-disk 发表于 2025-3-24 17:06:24
978-3-642-17649-4Springer Berlin Heidelberg 2010发酵剂 发表于 2025-3-24 21:20:57
http://reply.papertrans.cn/47/4659/465885/465885_19.png圆锥体 发表于 2025-3-24 23:27:23
http://reply.papertrans.cn/47/4659/465885/465885_20.png