Chronological 发表于 2025-3-26 21:47:02

http://reply.papertrans.cn/87/8635/863424/863424_31.png

Lipoma 发表于 2025-3-27 04:46:34

Independent Computations for Safe Remote Electronic Voting (Transcript of Discussion),h a pencil and you initial it. Well when I did that on my ballot, that ballot went in the trashcan. Of course I had no idea. So since I’ve been involved with information security for a while, when I retired from the Marine Corps, I made this a focus of my research.

Ornithologist 发表于 2025-3-27 06:58:23

ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets,erifier, reaching malware-free memory states, and trusted application booting in the presence of malicious software that is controlled by a network adversary. Our system design revisits the notion of . (DABLS), and illustrates both the significant challenges of making it work in practice and how to overcome them.

设想 发表于 2025-3-27 11:51:35

http://reply.papertrans.cn/87/8635/863424/863424_34.png

coltish 发表于 2025-3-27 14:30:53

0302-9743 ripts of the presentation and workshop discussion and an introduction, i.e. 15 contributions in total. The theme of the workshop was "What‘s Happening on the Other Channel?".978-3-642-41716-0978-3-642-41717-7Series ISSN 0302-9743 Series E-ISSN 1611-3349

抑制 发表于 2025-3-27 20:27:44

Verifiable Postal Voting,ends on procedural assumptions at the point where the ballots are received. These procedures should be public and could be enforced by a group of observers, but are not publicly verifiable afterwards by observers who were absent at the time.

得意人 发表于 2025-3-28 00:22:41

http://reply.papertrans.cn/87/8635/863424/863424_37.png

Indent 发表于 2025-3-28 02:41:24

Simple Defences against Vibration-Based Keystroke Fingerprinting Attacks,ia the vibration medium into the accelerometer, reduces the efficiency of the attack from 80% to random guessing. We conclude that our work presents an important step towards disabling the covert channel and ensuring full security.

Incorruptible 发表于 2025-3-28 08:03:11

Conference proceedings 2013K, in March 2013. The volume contains 14 revised papers with transcripts of the presentation and workshop discussion and an introduction, i.e. 15 contributions in total. The theme of the workshop was "What‘s Happening on the Other Channel?".

Decline 发表于 2025-3-28 13:31:27

http://reply.papertrans.cn/87/8635/863424/863424_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Security Protocols; 21st International W Bruce Christianson,James Malcolm,Joseph Bonneau Conference proceedings 2013 Springer-Verlag Berlin