表脸 发表于 2025-3-25 05:31:27

http://reply.papertrans.cn/67/6629/662886/662886_21.png

机警 发表于 2025-3-25 10:16:12

http://reply.papertrans.cn/67/6629/662886/662886_22.png

BROW 发表于 2025-3-25 12:14:55

http://reply.papertrans.cn/67/6629/662886/662886_23.png

Parabola 发表于 2025-3-25 17:23:37

Towards Security Authentication for IoT Devices with Lattice-Based ZK,ch IoT node plays a central role in secure communications. Generally, zero-knowledge identification scheme enables one party to authenticate himself without disclosing any additional information. However, a zero-knowledge based protocol normally involves heavily computational or interactive overhead

倔强不能 发表于 2025-3-25 22:44:51

Secure Semantic Search Based on Two-Level Index Over Encrypted Cloud,ata search on the cloud is very important. Now there are a lot existed keyword search schemes in which the relationship between the size of the file set and the search time is linear. In order to solve this problem, we propose a semantic retrieval framework for central word expansion based on two-le

intention 发表于 2025-3-26 02:18:05

http://reply.papertrans.cn/67/6629/662886/662886_26.png

ALT 发表于 2025-3-26 06:35:43

Walking on the Cloud: Gait Recognition, a Wearable Solution,iometrics as a Service - BaaS). The advantages for the final user is to be relieved from the burden related to acquire/maintain specific software, and to gain the ability of building personalized applications where biometric services can be embedded through suitable cloud APIs. Gait is one of the pr

知识分子 发表于 2025-3-26 09:26:02

EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control,ol to data, where access control policies should be flexible and distinguishable among users with different privileges. In this paper, we present .-., a novel Multi Authorisation Level Attribute Based Access Control with short ciphertexts size. It relies on the usage of a constant-size threshold att

说明 发表于 2025-3-26 13:11:24

http://reply.papertrans.cn/67/6629/662886/662886_29.png

悲观 发表于 2025-3-26 18:44:49

http://reply.papertrans.cn/67/6629/662886/662886_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Network and System Security; 12th International C Man Ho Au,Siu Ming Yiu,Kamil Kluczniak Conference proceedings 2018 Springer Nature Switze