不规则的跳动 发表于 2025-3-23 11:29:33

http://reply.papertrans.cn/48/4762/476106/476106_11.png

善于 发表于 2025-3-23 15:59:52

,A New Construction of Leakage-Resilient Identity-Based Encryption Scheme,ctice because of various leakage attacks. Therefore, the leakage resilience property should be considered in designing these primitives. However, in identity-based cryptography, most of the existing leakage-resilient identity-based encryption (IBE) schemes suffer some limitations: they either resist

Dendritic-Cells 发表于 2025-3-23 21:39:45

http://reply.papertrans.cn/48/4762/476106/476106_13.png

BADGE 发表于 2025-3-23 22:56:56

http://reply.papertrans.cn/48/4762/476106/476106_14.png

Accolade 发表于 2025-3-24 06:26:46

,Breaking GEA-Like Stream Ciphers with Lower Time Cost,ed version of GEA-2 proposed recently. In this paper, new weaknesses of GEA-like stream ciphers (i.e., GEA-1, GEA-2 and GEA-2a) are discovered and analyzed. As the technical contribution, an automatic algorithm is proposed to search for differential paths of full GEA-like stream ciphers. By this aut

细节 发表于 2025-3-24 08:53:21

SNIPER: Detect Complex Attacks Accurately from Traffic,me processes of APT attacks inevitably expose behavioral beacons in traffic, which makes it possible to detect APT attacks from traffic. Unlike deploying attack detectors at end devices or critical servers, anomaly detection at the network entrance provides a larger monitoring field but has to bear

爵士乐 发表于 2025-3-24 13:47:18

http://reply.papertrans.cn/48/4762/476106/476106_17.png

delegate 发表于 2025-3-24 17:38:51

http://reply.papertrans.cn/48/4762/476106/476106_18.png

OVERT 发表于 2025-3-24 21:47:50

,Parallel Implementation of Sieving Algorithm on Heterogeneous CPU-GPU Computing Architectures,ely utilize either CPUs or GPUs. This paper introduces a novel sieving approach tailored to CPU+GPU heterogeneous computing platforms. We constructed a runtime system capable of concurrently executing both CPU and GPU versions of the sieving algorithm. The GPU version of the sieving algorithm reduce

Excitotoxin 发表于 2025-3-25 00:09:29

,Unveiling the Efficacy of BERT’s Attention in Memory Obfuscated Malware Detection, by targeting a system’s volatile memory. By leveraging transformer-based models, notably BERT, the research demonstrates promising advancements in malware detection. Through data augmentation and rigorous feature selection processes, the study enhances the CIC-MlMem-2022 dataset, improving its qual
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Information Security Practice and Experience; 19th International C Zhe Xia,Jiageng Chen Conference proceedings 2025 The Editor(s) (if appli