蒸发 发表于 2025-3-30 10:46:44
Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attackng computer system. This paper presents a scheme of protecting program counter by encoding function pointers. In the scheme, every function address is encoded by linker. Compiler inserts instructions for decoding function addresses before call instruction. Encoding code pointers, function addresses得罪人 发表于 2025-3-30 14:10:39
An Evaluation of Different IP Traceback Approachesten use incorrect, or spoofed, source IP addresses. In this paper we present the results from a comparison between some of the most promising traceback techniques proposed to solve this problem. Our goal was to evaluate and analyze the most promising techniques on our way to find a more efficient apnuclear-tests 发表于 2025-3-30 16:38:32
Security against Inference Attacks on Negative Information in Object-Oriented Databaseses. Although many studies so far focus on only inference of positive information (i.e., which object is the execution result of a given unauthorized query), negative information (i.e., which object is never the execution result of a given unauthorized query) is also sensitive. In this paper, we defiEntropion 发表于 2025-3-31 00:23:57
Robust Key-Evolving Public Key Encryption Schemessed for forward-secure digital signature schemes. Let time be divided into time periods such that at time period ., the decryptor holds the secret key .., while the public key PK is fixed during its lifetime. At time period ., a sender encrypts a message . as 〈.〉, which can be decrypted only with thcrutch 发表于 2025-3-31 01:24:04
A Group Signature Scheme Committing the Groupn a message on behalf of a group, and the anonymity of the signature can be revoked by only a designated authority. Consider a situation that multiple groups exist. In the proposed scheme, the signature hides not only the identity of the signer, but also the identity of the group. The group can be s垫子 发表于 2025-3-31 08:54:02
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructionsnto and secret information, e.g. decryption key, may be exposed. Very recently, a new framework for the protection against such key exposure problem was suggested and was called, . (KIE). In this paper, we study key insulated cryptosystems without computational assumptions. First, we define the modeacrimony 发表于 2025-3-31 12:04:48
http://reply.papertrans.cn/47/4660/465906/465906_57.png宣誓书 发表于 2025-3-31 13:26:38
Reducing the Memory Complexity of Type-Inference Algorithmsl machine’s security mechanisms. One of the statically ensured properties is .. The type-inference phase is the overwhelming resource-consuming part of the verification process..This paper addresses the RAM bottleneck met while verifying mobile code in memory-constrained environments such as smart-c剧毒 发表于 2025-3-31 18:56:45
Password-Authenticated Key Exchange between Clients with Different Passwordsshared password. With a rapid change in modern communication environments, it is necessary to construct a secure end-to-end channel between clients, which is a quite different paradigm from the existing ones. In this paper we propose a new framework which provides a password-authenticated key exchanjettison 发表于 2025-3-31 23:47:38
http://reply.papertrans.cn/47/4660/465906/465906_60.png