遗忘 发表于 2025-3-25 04:28:15
Defeat Information Leakage from Browser Extensions via Data Obfuscationser transactions. A prototype has been implemented and iObfus works seamlessly with the Chromium 25. Evaluation against malicious extensions shows the effectiveness of iObfus, while it only introduces trivial overhead to benign extensions.Congruous 发表于 2025-3-25 09:18:28
http://reply.papertrans.cn/47/4659/465887/465887_22.pngHeart-Attack 发表于 2025-3-25 15:15:13
A Secure and Efficient Scheme for Cloud Storage against Eavesdropperve a formal description of “Secure DSS against an ℓ-eavesdropper”. Applying a secure hash function and concatenated with the Product-Matrix minimum bandwidth regenerating(PM-MBR) code, our scheme significantly improves the secrecy capacity and keeps the loss of data rate constantly in a low level wi催眠 发表于 2025-3-25 17:28:55
Secure and Private Outsourcing of Shape-Based Feature Extractionout within this framework, by presenting two schemes for doing so, and demonstrating their viability by experimentally evaluating them. Our results can be used in a number of practical situations. In one scenario the client has images and wants to securely outsource shape-based feature extraction on干涉 发表于 2025-3-25 23:58:10
http://reply.papertrans.cn/47/4659/465887/465887_25.png失望未来 发表于 2025-3-26 00:33:54
PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh NetworksS function distribution as an integer linear program and propose algorithms for solving it accurately and fast (i.e., practical). We evaluate the performance of our proposed solution in a real-world, department-wide, mesh network.恶臭 发表于 2025-3-26 06:12:57
http://reply.papertrans.cn/47/4659/465887/465887_27.png山间窄路 发表于 2025-3-26 09:51:49
http://reply.papertrans.cn/47/4659/465887/465887_28.png明智的人 发表于 2025-3-26 12:37:16
http://reply.papertrans.cn/47/4659/465887/465887_29.pngbeta-cells 发表于 2025-3-26 17:33:05
http://reply.papertrans.cn/47/4659/465887/465887_30.png