手术刀 发表于 2025-3-25 03:46:24
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols,John Ioannidis at AT&T Labs and Angelos Keromytis at the University of Pennsylvania. We are just about done with a first cut of a protocol that I’d like to talk about it, get feedback on, and discuss the requirements for such a protocol.无能性 发表于 2025-3-25 10:01:32
http://reply.papertrans.cn/87/8635/863409/863409_22.pngFILLY 发表于 2025-3-25 15:26:56
http://reply.papertrans.cn/87/8635/863409/863409_23.png连系 发表于 2025-3-25 17:48:32
Towards a Survivable Security Architecture for Ad-Hoc Networks,pport from pre-existing infrastructure such as central servers, security associations or CAs. Our architecture is fully distributed and based on groups and public-key certification. The goal is a survivable system that functions well even when network nodes fail and connections are only occasional.ANTI 发表于 2025-3-25 21:04:01
http://reply.papertrans.cn/87/8635/863409/863409_25.png转换 发表于 2025-3-26 03:05:50
http://reply.papertrans.cn/87/8635/863409/863409_26.png预兆好 发表于 2025-3-26 04:34:51
http://reply.papertrans.cn/87/8635/863409/863409_27.pngcoagulate 发表于 2025-3-26 09:12:38
http://reply.papertrans.cn/87/8635/863409/863409_28.png帐单 发表于 2025-3-26 14:53:34
http://reply.papertrans.cn/87/8635/863409/863409_29.png意外 发表于 2025-3-26 19:06:40
A Multi-OS Approach to Trusted Computer Systems,venient in private sectors because they were developed for use by government agencies and the military. This paper describes how a trusted system can be made from an ordinary OS for daily use and a secure OS monitoring that OS. This configuration is implemented by using the multi-OS control techniqu