Galactogogue 发表于 2025-3-28 18:15:37

http://reply.papertrans.cn/47/4659/465889/465889_41.png

凹槽 发表于 2025-3-28 21:00:09

On the Design of Fast Prefix-Preserving IP Address Anonymization Schemethm uses precomputed bit string to improve the anonymization performance. Instead of only using the LSB of each Rijndael output, the embedded bit string algorithm will take advantage of the full size Rijndael output to anonymize several bits at the same time. The implementation can be downloaded from https://sourceforge.net/projects/ipanon.

光亮 发表于 2025-3-28 22:54:11

MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Seture by .. The experimental results demonstrate that MDH can improve matching performance by 100% to 300% comparing with other popular algorithms, whereas the memory requirement stays in a comparatively low level.

EPT 发表于 2025-3-29 06:30:02

A New Dynamic Accumulator for Batch Updates dynamic accumulator for batch updates based on the Paillier cryptosystem. Our construction makes a batch of update operations at unit cost. We prove its security under the extended strong RSA (es-RSA) assumption.

卷发 发表于 2025-3-29 09:56:58

http://reply.papertrans.cn/47/4659/465889/465889_45.png

cumulative 发表于 2025-3-29 15:00:31

PAKE,: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.(log.). Additionally, the hierarchical feature of .PAKE. enables every subgroup obtains their own subgroup key in the end. We also prove the security of our protocol under the random oracle model and the ideal cipher model.

JIBE 发表于 2025-3-29 15:45:26

Formal Definition and Construction of Nominative Signatureropose a formal definition and adversarial model for nominative signature. Third, we show that Chaum’s undeniable signature can be transformed to an efficient nominative signature by simply using a standard signature. The security of our transformation can be proven under the standard number-theoretic assumption.

Accede 发表于 2025-3-29 22:59:28

Preventing Unofficial Information Propagationnd the Platform for Privacy Preferences (P3P) assumes that qualified or certified credential viewers are honest and reliable. The proposed approach in this paper uses short-lived credentials based on reverse forward secure signatures to remove this assumption and mitigate the damage caused by a dishonest or honest but compromised viewer.

debouch 发表于 2025-3-30 00:26:42

http://reply.papertrans.cn/47/4659/465889/465889_49.png

疲惫的老马 发表于 2025-3-30 06:53:59

http://reply.papertrans.cn/47/4659/465889/465889_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information and Communications Security; 9th International Co Sihan Qing,Hideki Imai,Guilin Wang Conference proceedings 2007 Springer-Verla