Nonthreatening 发表于 2025-3-28 17:59:52

Privacy-Preserving Distance-Bounding Proof-of-Knowledge,ave numerous applications including authentication and proximity checking. The privacy problem in . protocols was limited to privacy against . adversaries. Gambs . [.] extended this limitation and proposed a protocol that provides . privacy when the verifier is malicious, or . registration authority

Brain-Waves 发表于 2025-3-28 22:17:09

Distance Lower Bounding,applications in secure authentication and location based services. We consider the dual problem of distance lower bounding (DLB), where the prover proves it is outside a distance bound to the verifier. We motivate this problem through a number of application scenarios, and model security against dis

仇恨 发表于 2025-3-29 02:59:04

Efficient Adaptive Oblivious Transfer Without ,-type Assumptions in UC Framework,arty computation protocols, the efficiency and security are two big issues in its design. In this paper, we present an efficient, . (UC) secure adaptive oblivious transfer without .-.. The proposed protocol is UC secure under Decision Linear (DLIN), Decision Bilinear Diffie-Hellman (DBDH) and Square

INERT 发表于 2025-3-29 06:15:37

http://reply.papertrans.cn/47/4660/465908/465908_44.png

judicial 发表于 2025-3-29 07:42:22

http://reply.papertrans.cn/47/4660/465908/465908_45.png

conformity 发表于 2025-3-29 11:30:53

http://reply.papertrans.cn/47/4660/465908/465908_46.png

hankering 发表于 2025-3-29 19:20:22

Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors,ms to fit resource-limited embedded systems. In this paper, we describe optimization techniques to speed up multi-precision multiplication and squaring on the AVR ATmega series of 8-bit microcontrollers. First, we present a new approach to perform multi-precision multiplication, called ., that resem

LIKEN 发表于 2025-3-29 21:25:09

New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security,ructions of IBE schemes, the one proposed by Boneh and Boyen (in Eurocrypt 2004) is quite important from both practical and theoretical points of view. The scheme was standardized as IEEE P1363.3 and is the basis for many subsequent constructions. In this paper, we investigate its multi-challenge se

prolate 发表于 2025-3-30 03:07:26

Method for Determining Whether or not Text Information Is Leaked from Computer Display Through Elecains text information, this paper proposed an evaluation method without reconstructing the displayed image. In this method, sparse decomposition in wavelet is used to describe the characteristics of electromagnetic radiation signals contain text information. By using this method, it is easy to detec

咒语 发表于 2025-3-30 07:16:01

http://reply.papertrans.cn/47/4660/465908/465908_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Information and Communications Security; 16th International C Lucas C. K. Hui,S. H. Qing,S. M. Yiu Conference proceedings 2015 Springer Int