不整齐 发表于 2025-3-27 00:54:39

http://reply.papertrans.cn/47/4660/465901/465901_31.png

Negligible 发表于 2025-3-27 04:40:12

Point-Based Trust: Define How Much Privacy Is Worth Specifically, Bob values each credential with a certain number of points, and requires a minimum total threshold of points before granting Alice access to a resource. In turn, Alice values each of her credentials with a privacy score that indicates her reluctance to reveal that credential. Bob’s va

cogitate 发表于 2025-3-27 08:58:48

http://reply.papertrans.cn/47/4660/465901/465901_33.png

含沙射影 发表于 2025-3-27 13:07:16

Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper)ased hash protocol proposed by Molnar and Wagner presents a scalable, privacy-preserving solution. Previous analyses of this protocol concluded that an attacker who can extract secrets from a large number of tags can compromise privacy of other tags. We propose a new metric for information leakage i

cylinder 发表于 2025-3-27 13:45:22

http://reply.papertrans.cn/47/4660/465901/465901_35.png

cochlea 发表于 2025-3-27 21:17:38

http://reply.papertrans.cn/47/4660/465901/465901_36.png

合法 发表于 2025-3-28 00:04:17

From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solutiontherefore minimally trusted in distributed systems leading to their usefulness in many applications. However, till date no application of proxy encryption has been deployed and used in practice. In this work we describe our efforts in developing a deployable secure mailing list solution based on pro

Spirometry 发表于 2025-3-28 03:19:33

https://doi.org/10.1007/11935308NC; access control; authentication; control; cryptoanalysis; cryptographic protocol; cryptography; data sec

corpus-callosum 发表于 2025-3-28 07:56:01

978-3-540-49496-6Springer-Verlag Berlin Heidelberg 2006

ARIA 发表于 2025-3-28 10:24:46

Information and Communications Security978-3-540-49497-3Series ISSN 0302-9743 Series E-ISSN 1611-3349
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Information and Communications Security; 8th International Co Peng Ning,Sihan Qing,Ninghui Li Conference proceedings 2006 Springer-Verlag B