比赛用背带 发表于 2025-3-27 00:01:10

http://reply.papertrans.cn/84/8309/830819/830819_31.png

名字的误用 发表于 2025-3-27 03:39:45

,How IT Infrastructures Break: Better Modeling for Better Risk Management,ical and organizational domains. Risk management is therefore essential to ensure infrastructure resilience, compliance with legal and contractual requirements and a better knowledge of what causes what. But risk management is hard to automate, sometimes because criteria are subject to human appreci

倒转 发表于 2025-3-27 06:34:48

IoT Security Within Small and Medium-Sized Manufacturing Companies,all and medium-sized companies (SMEs). Along with the technical innovations, especially in the environment of cloud based IoT solutions, the topic of IoT security is gaining outstanding importance. This paper presents a pre-study and investigation of the experience, awareness, activities, and knowle

提名 发表于 2025-3-27 13:15:10

,An Incentive Mechanism for Managing Obligation Delegation,rt of security policies, which specify what actions a user is obliged to perform in the future. One interesting feature of obligations is unenforceable, that is, the system cannot guarantee that each obligation will be fulfilled. Indeed, obligations go unfulfilled for a variety of reasons. For examp

绝缘 发表于 2025-3-27 16:56:40

http://reply.papertrans.cn/84/8309/830819/830819_35.png

大喘气 发表于 2025-3-27 18:05:33

,Pseudonym Swapping with Secure Accumulators and Double Diffie-Hellman Rounds in Cooperative Intellian adversary can link a certain vehicle to a geographical bounded area or usage of services, there is a need to protect the vehicle’s real identity, but at the same time being able to prove its existence at a later stage due to auditing. We propose a pseudonym swapping protocol aligned with a new se

Airtight 发表于 2025-3-28 01:00:25

http://reply.papertrans.cn/84/8309/830819/830819_37.png

繁荣中国 发表于 2025-3-28 02:19:12

http://reply.papertrans.cn/84/8309/830819/830819_38.png

圣歌 发表于 2025-3-28 07:02:42

,Pseudonym Swapping with Secure Accumulators and Double Diffie-Hellman Rounds in Cooperative Intellicurity architecture where signature keys are stored in both a typical secure hardware module and in a secure accumulator that provides proof for key validity. We propose minor adjustments to the current ETSI standard to include such secure setup and provide a comparative proof of concept implementation between two variants of secure accumulators.

ELUC 发表于 2025-3-28 12:54:27

Conference proceedings 2023ace in Sousse, Tunesia, during December 7-9, 2022.. The 14full papers and 4 short papers included in this volume were carefully reviewed and selected from 39 submissions. The papers detail security issues in internet-related applications, networks and systems.
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Risks and Security of Internet and Systems; 17th International C Slim Kallel,Mohamed Jmaiel,Nora Cuppens Conference proceedings 2023 The Ed