cardiopulmonary 发表于 2025-3-28 15:01:50

http://reply.papertrans.cn/47/4659/465885/465885_41.png

patriot 发表于 2025-3-28 19:34:26

CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization The contributions of this paper are twofold: first, to investigate the characteristics and security requirements of CUDA-enabled cloud computing nodes; and, second, to provide an architecture for leveraging CUDA hardware resources in a secure virtualization environment, to improve cloud security wi

名义上 发表于 2025-3-29 01:05:27

SEIP: Simple and Efficient Integrity Protection for Open Mobile Platformsns while still achieves a high assurance of platform integrity. SEIP is deployed within a commercially available Linux-based smartphone and demonstrates that it can effectively prevent certain malware. The security policy of our implementation is less than 20kB, and a performance study shows that it

cacophony 发表于 2025-3-29 06:36:00

Compromise-Resilient Anti-jamming for Wireless Sensor Networkse network will generate a new group key to be shared only by all non-compromised nodes. After that, the insider jammer is revoked and will be unable to predict the future communication channels used by non-compromised nodes. We implement and evaluate our solution using the Mica2 Mote platform and sh

Chagrin 发表于 2025-3-29 09:37:17

Cryptographic Hash Functions: Theory and Practiceis invested in this topic was rather limited. From the hundred designs published before 2005, about 80% was cryptanalyzed; this includes widely used hash functions such as MD4 and MD5. Moreover, serious shortcomings have been identified in the theoretical foundations of existing designs. In response

Incommensurate 发表于 2025-3-29 12:22:13

http://reply.papertrans.cn/47/4659/465885/465885_46.png

说不出 发表于 2025-3-29 19:34:51

Fine-Grained Disclosure of Access Policies evaluation of (certified or uncertified) properties, that clients can present. Since assuming the client to know a-priori the properties she should present to acquire access is clearly limiting, servers should be able to respond to client requests with information on the access control policies reg

Euphonious 发表于 2025-3-29 19:49:58

http://reply.papertrans.cn/47/4659/465885/465885_48.png

防锈 发表于 2025-3-30 01:17:21

http://reply.papertrans.cn/47/4659/465885/465885_49.png

ODIUM 发表于 2025-3-30 07:25:57

Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts schemes suffer from either long ciphertexts with size linear in the number of authorized users or can only achieve non-adaptive security. A non-adaptive attacker is assumed to disclose her target attacking set of users even before the system parameters are published. The notion of non-adaptive secu
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information and Communications Security; 12th International C Miguel Soriano,Sihan Qing,Javier López Conference proceedings 2010 Springer B