遗忘
发表于 2025-3-25 04:28:15
Defeat Information Leakage from Browser Extensions via Data Obfuscationser transactions. A prototype has been implemented and iObfus works seamlessly with the Chromium 25. Evaluation against malicious extensions shows the effectiveness of iObfus, while it only introduces trivial overhead to benign extensions.
Congruous
发表于 2025-3-25 09:18:28
http://reply.papertrans.cn/47/4659/465887/465887_22.png
Heart-Attack
发表于 2025-3-25 15:15:13
A Secure and Efficient Scheme for Cloud Storage against Eavesdropperve a formal description of “Secure DSS against an ℓ-eavesdropper”. Applying a secure hash function and concatenated with the Product-Matrix minimum bandwidth regenerating(PM-MBR) code, our scheme significantly improves the secrecy capacity and keeps the loss of data rate constantly in a low level wi
催眠
发表于 2025-3-25 17:28:55
Secure and Private Outsourcing of Shape-Based Feature Extractionout within this framework, by presenting two schemes for doing so, and demonstrating their viability by experimentally evaluating them. Our results can be used in a number of practical situations. In one scenario the client has images and wants to securely outsource shape-based feature extraction on
干涉
发表于 2025-3-25 23:58:10
http://reply.papertrans.cn/47/4659/465887/465887_25.png
失望未来
发表于 2025-3-26 00:33:54
PRIDE: Practical Intrusion Detection in Resource Constrained Wireless Mesh NetworksS function distribution as an integer linear program and propose algorithms for solving it accurately and fast (i.e., practical). We evaluate the performance of our proposed solution in a real-world, department-wide, mesh network.
恶臭
发表于 2025-3-26 06:12:57
http://reply.papertrans.cn/47/4659/465887/465887_27.png
山间窄路
发表于 2025-3-26 09:51:49
http://reply.papertrans.cn/47/4659/465887/465887_28.png
明智的人
发表于 2025-3-26 12:37:16
http://reply.papertrans.cn/47/4659/465887/465887_29.png
beta-cells
发表于 2025-3-26 17:33:05
http://reply.papertrans.cn/47/4659/465887/465887_30.png