cardiopulmonary 发表于 2025-3-28 15:01:50
http://reply.papertrans.cn/47/4659/465885/465885_41.pngpatriot 发表于 2025-3-28 19:34:26
CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization The contributions of this paper are twofold: first, to investigate the characteristics and security requirements of CUDA-enabled cloud computing nodes; and, second, to provide an architecture for leveraging CUDA hardware resources in a secure virtualization environment, to improve cloud security wi名义上 发表于 2025-3-29 01:05:27
SEIP: Simple and Efficient Integrity Protection for Open Mobile Platformsns while still achieves a high assurance of platform integrity. SEIP is deployed within a commercially available Linux-based smartphone and demonstrates that it can effectively prevent certain malware. The security policy of our implementation is less than 20kB, and a performance study shows that itcacophony 发表于 2025-3-29 06:36:00
Compromise-Resilient Anti-jamming for Wireless Sensor Networkse network will generate a new group key to be shared only by all non-compromised nodes. After that, the insider jammer is revoked and will be unable to predict the future communication channels used by non-compromised nodes. We implement and evaluate our solution using the Mica2 Mote platform and shChagrin 发表于 2025-3-29 09:37:17
Cryptographic Hash Functions: Theory and Practiceis invested in this topic was rather limited. From the hundred designs published before 2005, about 80% was cryptanalyzed; this includes widely used hash functions such as MD4 and MD5. Moreover, serious shortcomings have been identified in the theoretical foundations of existing designs. In responseIncommensurate 发表于 2025-3-29 12:22:13
http://reply.papertrans.cn/47/4659/465885/465885_46.png说不出 发表于 2025-3-29 19:34:51
Fine-Grained Disclosure of Access Policies evaluation of (certified or uncertified) properties, that clients can present. Since assuming the client to know a-priori the properties she should present to acquire access is clearly limiting, servers should be able to respond to client requests with information on the access control policies regEuphonious 发表于 2025-3-29 19:49:58
http://reply.papertrans.cn/47/4659/465885/465885_48.png防锈 发表于 2025-3-30 01:17:21
http://reply.papertrans.cn/47/4659/465885/465885_49.pngODIUM 发表于 2025-3-30 07:25:57
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts schemes suffer from either long ciphertexts with size linear in the number of authorized users or can only achieve non-adaptive security. A non-adaptive attacker is assumed to disclose her target attacking set of users even before the system parameters are published. The notion of non-adaptive secu