labyrinth
发表于 2025-3-26 21:33:40
http://reply.papertrans.cn/87/8634/863306/863306_31.png
有说服力
发表于 2025-3-27 04:42:29
Efficient Oblivious Proofs of Correct Exponentiationependent interest, we show how to turn any standard discrete log signature scheme into a scheme for proving equality of discrete logarithms. We demonstrate our method using the Schnorr signature scheme.
notification
发表于 2025-3-27 07:04:31
Protecting Key Exchange and Management Protocols Against Resource Clogging Attackstively. The paper introduces and discusses the Photuris anti-clogging mechanism, derives some design considerations, and elaborates on possibilities to use similar techniques to improve an existing HTTP state management protocol and to protect TCP/IP implementations against TCP SYN flooding attacks.
抚育
发表于 2025-3-27 11:53:47
Book 1999m September 20-21, 1999. The Conference, arrangedjointly by Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP), was organized by the Department of Electrical Engineering of the Katholieke Universiteit Leuven. The name "Communications and Multimedia Securit
尖叫
发表于 2025-3-27 14:52:04
http://reply.papertrans.cn/87/8634/863306/863306_35.png
高脚酒杯
发表于 2025-3-27 19:13:35
Formal Design of Efficient Authentication and Key Agreement Protocolsassify cryptosystems and protocol runs and provide a generic design approach, which is on an idealised layer independent from the cryptosystem to be used. We show, how concrete specifications of new protocols may be derived and propose the integration of our method with existing specification methods and software development tools.
奇思怪想
发表于 2025-3-27 22:23:23
http://reply.papertrans.cn/87/8634/863306/863306_37.png
返老还童
发表于 2025-3-28 05:14:10
http://reply.papertrans.cn/87/8634/863306/863306_38.png
四溢
发表于 2025-3-28 07:09:35
http://reply.papertrans.cn/87/8634/863306/863306_39.png
我要威胁
发表于 2025-3-28 11:30:44
Watermarking and Secure Distribution for Encrypted Videon keys. After the decrypting and decoding process, the video signal still contains the watermark inside. We describe such a scheme which applies this technique for the purpose of secure distribution of copyright data. The scheme incorporates public keys for which the RSA algorithm is assumed.