Blood-Clot 发表于 2025-3-28 16:54:18

http://reply.papertrans.cn/87/8636/863517/863517_41.png

hazard 发表于 2025-3-28 20:33:41

978-3-031-30622-8ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2023

cylinder 发表于 2025-3-29 02:57:29

http://reply.papertrans.cn/87/8636/863517/863517_43.png

脱毛 发表于 2025-3-29 04:19:21

http://reply.papertrans.cn/87/8636/863517/863517_44.png

毗邻 发表于 2025-3-29 10:31:19

http://reply.papertrans.cn/87/8636/863517/863517_45.png

Indelible 发表于 2025-3-29 14:14:51

http://reply.papertrans.cn/87/8636/863517/863517_46.png

Extricate 发表于 2025-3-29 17:06:43

http://reply.papertrans.cn/87/8636/863517/863517_47.png

Pigeon 发表于 2025-3-29 20:37:08

Efficient Two-Party Authentication Key Agreement Protocol Using Reconciliation Mechanism from Lattice are various security requirements need to meet, but also communication party is resource-constrained. Recently, a large number of 2PAKA schemes for IoT have been presented, yet most of them are subject to quantum attack. In this paper, we put forward a quantum-secure 2PAKA protocol using lattice c

Ingenuity 发表于 2025-3-30 03:21:46

Anonymous and Practical Multi-factor Authentication for Mobile Devices Using Two-Server Architecturerivilege attack, dictionary guessing attack, and other attacks. To solve the above problems, this paper proposes an anonymous and practical multi-factor authentication protocol for mobile devices using two-server architecture with honeywords. The protocol is more secure than the existing single-fact

不爱防注射 发表于 2025-3-30 06:15:46

http://reply.papertrans.cn/87/8636/863517/863517_50.png
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Security and Privacy in New Computing Environments; 5th EAI Internationa Qi Jiang,Xinghua Li,Ding Wang Conference proceedings 2023 ICST Ins