labyrinth 发表于 2025-3-26 21:33:40
http://reply.papertrans.cn/87/8634/863306/863306_31.png有说服力 发表于 2025-3-27 04:42:29
Efficient Oblivious Proofs of Correct Exponentiationependent interest, we show how to turn any standard discrete log signature scheme into a scheme for proving equality of discrete logarithms. We demonstrate our method using the Schnorr signature scheme.notification 发表于 2025-3-27 07:04:31
Protecting Key Exchange and Management Protocols Against Resource Clogging Attackstively. The paper introduces and discusses the Photuris anti-clogging mechanism, derives some design considerations, and elaborates on possibilities to use similar techniques to improve an existing HTTP state management protocol and to protect TCP/IP implementations against TCP SYN flooding attacks.抚育 发表于 2025-3-27 11:53:47
Book 1999m September 20-21, 1999. The Conference, arrangedjointly by Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP), was organized by the Department of Electrical Engineering of the Katholieke Universiteit Leuven. The name "Communications and Multimedia Securit尖叫 发表于 2025-3-27 14:52:04
http://reply.papertrans.cn/87/8634/863306/863306_35.png高脚酒杯 发表于 2025-3-27 19:13:35
Formal Design of Efficient Authentication and Key Agreement Protocolsassify cryptosystems and protocol runs and provide a generic design approach, which is on an idealised layer independent from the cryptosystem to be used. We show, how concrete specifications of new protocols may be derived and propose the integration of our method with existing specification methods and software development tools.奇思怪想 发表于 2025-3-27 22:23:23
http://reply.papertrans.cn/87/8634/863306/863306_37.png返老还童 发表于 2025-3-28 05:14:10
http://reply.papertrans.cn/87/8634/863306/863306_38.png四溢 发表于 2025-3-28 07:09:35
http://reply.papertrans.cn/87/8634/863306/863306_39.png我要威胁 发表于 2025-3-28 11:30:44
Watermarking and Secure Distribution for Encrypted Videon keys. After the decrypting and decoding process, the video signal still contains the watermark inside. We describe such a scheme which applies this technique for the purpose of secure distribution of copyright data. The scheme incorporates public keys for which the RSA algorithm is assumed.