莎草 发表于 2025-3-25 04:53:56

http://reply.papertrans.cn/87/8635/863424/863424_21.png

Cocker 发表于 2025-3-25 11:19:13

Independent Computations for Safe Remote Electronic Voting,nd why we have not been able to leverage powerful personal computing devices to allow citizens to cast their ballots electronically. The argument turns on security weakness in all kinds of network computing and on theoretical limits on the ability to protect critical applications.

sacrum 发表于 2025-3-25 14:19:55

http://reply.papertrans.cn/87/8635/863424/863424_23.png

Unsaturated-Fat 发表于 2025-3-25 17:17:43

ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets,software flaws and operator errors. In this paper, we present the salient features of a system design which allows remote-device authentication by a verifier, reaching malware-free memory states, and trusted application booting in the presence of malicious software that is controlled by a network ad

Jogging 发表于 2025-3-25 23:04:04

http://reply.papertrans.cn/87/8635/863424/863424_25.png

photopsia 发表于 2025-3-26 02:55:22

Enhancements to Prepare-and-Measure Based QKD Protocols,-the-Middle attack and results in less leakage of key material to any eavesdropping attacker. We argue that this version is at least as secure as the original BB’84 scheme, but ensures a closer binding of the key establishment and authentication components of the protocol. Further proposed enhanceme

具体 发表于 2025-3-26 08:17:24

http://reply.papertrans.cn/87/8635/863424/863424_27.png

Self-Help-Group 发表于 2025-3-26 10:56:25

http://reply.papertrans.cn/87/8635/863424/863424_28.png

JADED 发表于 2025-3-26 16:13:29

http://reply.papertrans.cn/87/8635/863424/863424_29.png

万花筒 发表于 2025-3-26 20:52:36

Communication Setup in Anonymous Messaging,Not all members can be trusted, meaning that some may disclose relevant information to an adversary, and our adversary could have complete access to network communications..We will discuss here the protocol setup and start-up phase in anonymous messaging: this phase is highly critical and can actual
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Security Protocols; 21st International W Bruce Christianson,James Malcolm,Joseph Bonneau Conference proceedings 2013 Springer-Verlag Berlin