craven 发表于 2025-3-28 15:13:21

http://reply.papertrans.cn/47/4659/465887/465887_41.png

CLASH 发表于 2025-3-28 22:34:55

Secure and Private Outsourcing of Shape-Based Feature Extractionncrypted form, such that its own employees can query the encrypted data using weak devices (both computationally and storage-wise). Or a weak client wants to outsource an expensive computational task without revealing to the servers either the inputs or the computed outputs. The framework requires t

COWER 发表于 2025-3-28 23:58:53

Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its Countermeasuresle customer virtual machines (VMs) onto the same physical server with hardware virtualization technology. Xen is widely used in virtualization which charges VMs by wall clock time rather than resources consumed. Under this model, manipulation of the scheduler vulnerability may allow theft-of-service

钻孔 发表于 2025-3-29 03:47:38

http://reply.papertrans.cn/47/4659/465887/465887_44.png

返老还童 发表于 2025-3-29 07:53:17

A Covert Channel Using Event Channel State on Xen Hypervisor work has been done to resist covert channels, new covert channels still emerge in various manners. In this paper, we introduce event channel mechanism in detail. Then we develop a covert channel called CCECS(Covert Channel using Event Channel State) and implement it on Xen hypervisor. Finally we qu

豪华 发表于 2025-3-29 12:47:50

Type-Based Analysis of Protected Storage in the TPMcryptographic keys and other sensitive values in its shielded memory and act as . (RTS). The TPM interacts with applications via a predefined set of commands (an API). In this paper, we give an abstraction model for the TPM 2.0 specification concentrating on Protected Storage part. With identificati

Ambiguous 发表于 2025-3-29 18:10:42

http://reply.papertrans.cn/47/4659/465887/465887_47.png

消耗 发表于 2025-3-29 22:22:25

http://reply.papertrans.cn/47/4659/465887/465887_48.png

Keratin 发表于 2025-3-30 00:01:15

Efficient eCK-Secure Authenticated Key Exchange Protocols in the Standard Modelleakage of various kinds of secret information like the long-term private key and session-specific secret state. In this paper, we study the open problem on constructing eCK secure AKE protocol without random oracles and NAXOS like trick. A generic construction GC-KKN satisfying those requirements i

极小 发表于 2025-3-30 05:30:53

XLRF: A Cross-Layer Intrusion Recovery Framework for Damage Assessment and Recovery Plan Generationness continuity. Existing intrusion recovery approaches mostly focus on a single abstraction layer. OS level recovery cannot fully meet the correctness criteria defined by business process semantics, while business workflow level recovery usually results in . recovery plans. In this paper, we propos
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information and Communications Security; 15th International C Sihan Qing,Jianying Zhou,Dongmei Liu Conference proceedings 2013 Springer Int