addict 发表于 2025-3-25 06:52:05
Secure Human Communications Based on Biometrics Signalsentication schemes require communicating parties either share a secret/password or know each other’s public key. In this paper we suggest a novel user authentication scheme that is easy to use and overcomes the requirements of sharing password or public keys. Our scheme allows two human users to perinstulate 发表于 2025-3-25 08:51:56
Distance-Bounding Proof of Knowledge to Avoid Real-Time Attackshe context of pervasive computing, it is additionally required to verify the physical proximity of the authenticated party in order to avoid a set of real-time attacks. Brands and Chaum proposed distance-bounding protocols as a way to compute a practical upper bound on the distance between a proverforager 发表于 2025-3-25 13:54:00
An Adaptive Polling Scheme for IEEE 802.11 Wireless LANnsider the traffic characteristics such as time bound traffic, null poll, and priority. In the case of time bounded traffic, PCF must evolve to support degrees of priority. In this paper, we proposed an adaptive polling scheme to increase the performance of wireless LANs. Moreover, we focused to a p邪恶的你 发表于 2025-3-25 18:57:52
http://reply.papertrans.cn/87/8636/863530/863530_24.pngMORPH 发表于 2025-3-25 21:27:31
http://reply.papertrans.cn/87/8636/863530/863530_25.png和音 发表于 2025-3-26 01:09:08
Protecting Consumer Data in Composite Web Servicesth untrusted online vendors. The system extends to support protection of customer privacy when multiple vendors interact in composite web services. A . is introduced for safe execution of sensitive customer information in a protected environment and provides accountability in the case of disputed transactions.nonchalance 发表于 2025-3-26 07:28:45
http://reply.papertrans.cn/87/8636/863530/863530_27.pngLIMN 发表于 2025-3-26 09:17:44
http://reply.papertrans.cn/87/8636/863530/863530_28.pngDesert 发表于 2025-3-26 14:10:18
Distance-Bounding Proof of Knowledge to Avoid Real-Time Attackssucceeds to perform the distance-bounding process. However, frauds where a malicious prover and an intruder collaborate to cheat a verifier have been left as an open issue. In this paper, we provide a solution preventing both types of attacks.foreign 发表于 2025-3-26 18:56:57
http://reply.papertrans.cn/87/8636/863530/863530_30.png