labyrinth 发表于 2025-3-26 21:33:40

http://reply.papertrans.cn/87/8634/863306/863306_31.png

有说服力 发表于 2025-3-27 04:42:29

Efficient Oblivious Proofs of Correct Exponentiationependent interest, we show how to turn any standard discrete log signature scheme into a scheme for proving equality of discrete logarithms. We demonstrate our method using the Schnorr signature scheme.

notification 发表于 2025-3-27 07:04:31

Protecting Key Exchange and Management Protocols Against Resource Clogging Attackstively. The paper introduces and discusses the Photuris anti-clogging mechanism, derives some design considerations, and elaborates on possibilities to use similar techniques to improve an existing HTTP state management protocol and to protect TCP/IP implementations against TCP SYN flooding attacks.

抚育 发表于 2025-3-27 11:53:47

Book 1999m September 20-21, 1999. The Conference, arrangedjointly by Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP), was organized by the Department of Electrical Engineering of the Katholieke Universiteit Leuven. The name "Communications and Multimedia Securit

尖叫 发表于 2025-3-27 14:52:04

http://reply.papertrans.cn/87/8634/863306/863306_35.png

高脚酒杯 发表于 2025-3-27 19:13:35

Formal Design of Efficient Authentication and Key Agreement Protocolsassify cryptosystems and protocol runs and provide a generic design approach, which is on an idealised layer independent from the cryptosystem to be used. We show, how concrete specifications of new protocols may be derived and propose the integration of our method with existing specification methods and software development tools.

奇思怪想 发表于 2025-3-27 22:23:23

http://reply.papertrans.cn/87/8634/863306/863306_37.png

返老还童 发表于 2025-3-28 05:14:10

http://reply.papertrans.cn/87/8634/863306/863306_38.png

四溢 发表于 2025-3-28 07:09:35

http://reply.papertrans.cn/87/8634/863306/863306_39.png

我要威胁 发表于 2025-3-28 11:30:44

Watermarking and Secure Distribution for Encrypted Videon keys. After the decrypting and decoding process, the video signal still contains the watermark inside. We describe such a scheme which applies this technique for the purpose of secure distribution of copyright data. The scheme incorporates public keys for which the RSA algorithm is assumed.
页: 1 2 3 [4] 5
查看完整版本: Titlebook: Secure Information Networks; Communications and M Bart Preneel Book 1999 IFIP International Federation for Information Processing 1999 ATM.