Abduct 发表于 2025-3-30 09:30:00

http://reply.papertrans.cn/47/4660/465901/465901_51.png

寻找 发表于 2025-3-30 13:59:31

http://reply.papertrans.cn/47/4660/465901/465901_52.png

Insatiable 发表于 2025-3-30 17:21:58

Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper)particular, we show that a secure password based key exchange protocol can be transformed efficiently to a smartcard and password based two-factor authentication scheme provided that there exist pseudorandom functions and collision-resistant hash functions.

Notorious 发表于 2025-3-30 23:08:10

A Construction for General and Efficient Oblivious Commitment Based Envelope Protocols satisfies a predicate, we have an OCBE protocol for that predicate with constant additional cost. Compared with previous OCBE protocols, our construction is more general, more efficient, and has wide applicability.

monologue 发表于 2025-3-31 01:15:12

Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints ttom-up strategy for a particular part of the proof; this enables the algorithm to touch only those credentials that are related to the query, which are likely to be a small fraction of all the credentials in the system.

Invigorate 发表于 2025-3-31 05:31:10

Efficient Protocols for Privacy Preserving Matching Against Distributed Datasetsmputation and communication costs of our PPSI protocol decrease by 81% and 17% respectively, and the computation and communication costs of our PPSM protocol decrease by 80% and 50% respectively. In practical utilities both of our protocols save computation time and communication bandwidth.

Tidious 发表于 2025-3-31 12:44:06

http://reply.papertrans.cn/47/4660/465901/465901_57.png

初学者 发表于 2025-3-31 14:30:17

http://reply.papertrans.cn/47/4660/465901/465901_58.png

相容 发表于 2025-3-31 20:49:31

http://reply.papertrans.cn/47/4660/465901/465901_59.png

Allege 发表于 2025-4-1 00:58:56

http://reply.papertrans.cn/47/4660/465901/465901_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Information and Communications Security; 8th International Co Peng Ning,Sihan Qing,Ninghui Li Conference proceedings 2006 Springer-Verlag B