Irrigate 发表于 2025-3-30 08:32:03

http://reply.papertrans.cn/47/4660/465904/465904_51.png

Spinal-Tap 发表于 2025-3-30 12:59:08

http://reply.papertrans.cn/47/4660/465904/465904_52.png

SLING 发表于 2025-3-30 18:26:33

A Qualitative Evaluation of Security Patterns, been mentioned. Finally, threat categories for a software system have been identified. Based on these facts, it would be useful to evaluate known security patterns based on how well they follow each guideline, how they encounter with possible problems in building secure software and for which of the threat categories they do take care of.

贪婪的人 发表于 2025-3-30 23:07:23

Hydan: Hiding Information in Program Binaries,rmation in each executable (approximately . bit encoding rate), although this amount is sufficient for some of the potential applications mentioned. We conclude by discussing potential improvements to the capacity of the channel and other future work.

Obscure 发表于 2025-3-31 03:13:57

http://reply.papertrans.cn/47/4660/465904/465904_55.png

雪白 发表于 2025-3-31 06:19:17

http://reply.papertrans.cn/47/4660/465904/465904_56.png

BRAVE 发表于 2025-3-31 12:05:42

Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN, analysis shows that the scheme is secure and cost effective. The scheme is indeed content aware and ensures the verification rate intuitively reflecting a meaningful stream. Further on, we describe the general method of publishing and retrieving a stream in p2p CDN.

条街道往前推 发表于 2025-3-31 15:11:36

http://reply.papertrans.cn/47/4660/465904/465904_58.png

AROMA 发表于 2025-3-31 21:05:52

A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet,s to find an assignment of users/roles to tasks which satisfy the workflow constraints. The agents use constraint processing to solve their respective problems, and also attempt to achieve an optimized solution.

暴发户 发表于 2025-3-31 23:38:55

On the Minimal Assumptions of Group Signature Schemes,plies the existence of secure public-key encryption schemes. Our result shows that the construction of secure group signature schemes based solely on the existence of one-way functions is unlikely. This is in contrast to what is known for standard signature schemes, which can be constructed from any one-way function.
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Information and Communications Security; 6th International Co Javier Lopez,Sihan Qing,Eiji Okamoto Conference proceedings 2004 Springer-Ver