Obstruction 发表于 2025-3-25 05:24:54
http://reply.papertrans.cn/87/8634/863313/863313_21.png键琴 发表于 2025-3-25 07:47:53
Keynote: On the Security of Emergent Properties in Traditional and Ad-Hoc Networkshe end-to-end argument which guided much of the Internet design, in network security. We conclude with a common theme of current research in security of emergent properties, namely that of a new threat model whereby the adversary may adaptively compromise nodes of a network.柱廊 发表于 2025-3-25 11:56:12
http://reply.papertrans.cn/87/8634/863313/863313_23.png来就得意 发表于 2025-3-25 18:43:20
http://reply.papertrans.cn/87/8634/863313/863313_24.png山羊 发表于 2025-3-25 22:41:15
http://reply.papertrans.cn/87/8634/863313/863313_25.pngTincture 发表于 2025-3-26 03:28:47
A Novel Pairwise Key Predistribution Scheme for Ubiquitous Sensor Networksources like limited battery power, memory, processing capabilities etc. These Limitations make infeasible to apply traditional key management techniques such as public key cryptography or other complex cryptographic techniques in the USN. Based on polynomial key pre-distribution protocol, we propos完全 发表于 2025-3-26 07:57:25
http://reply.papertrans.cn/87/8634/863313/863313_27.png反复拉紧 发表于 2025-3-26 08:48:16
Server-Aided RSA Key Generation Against Collusion Attackcols, however, is that they cannot prevent a “collusion attack” in which two key generation servers communicate with each other to get useful information about the user’s private key. In this paper, we present two new server-aided RSA key generation protocols secure against such an attack. In additi迫击炮 发表于 2025-3-26 14:49:29
Hybrid Approach for Secure Mobile Agent Computationsschemes where cryptographic protocols are utilized. We review and analyze methods proposed for securing agent operations in the face of passive and active adversaries by means of secure multi-party computations. We examine the strengths and weaknesses of such techniques and pose hybrid schemes whichNonflammable 发表于 2025-3-26 16:49:49
An XML Standards Based Authorization Framework for Mobile Agents authorization framework for mobile agents. The system takes as a base distributed RBAC policies allowing the discretionary delegation of authorizations. A solution is provided to assign authorizations to mobile agents in a safe manner. Mobile agents do not need to carry sensitive information such a