addict 发表于 2025-3-25 06:52:05

Secure Human Communications Based on Biometrics Signalsentication schemes require communicating parties either share a secret/password or know each other’s public key. In this paper we suggest a novel user authentication scheme that is easy to use and overcomes the requirements of sharing password or public keys. Our scheme allows two human users to per

instulate 发表于 2025-3-25 08:51:56

Distance-Bounding Proof of Knowledge to Avoid Real-Time Attackshe context of pervasive computing, it is additionally required to verify the physical proximity of the authenticated party in order to avoid a set of real-time attacks. Brands and Chaum proposed distance-bounding protocols as a way to compute a practical upper bound on the distance between a prover

forager 发表于 2025-3-25 13:54:00

An Adaptive Polling Scheme for IEEE 802.11 Wireless LANnsider the traffic characteristics such as time bound traffic, null poll, and priority. In the case of time bounded traffic, PCF must evolve to support degrees of priority. In this paper, we proposed an adaptive polling scheme to increase the performance of wireless LANs. Moreover, we focused to a p

邪恶的你 发表于 2025-3-25 18:57:52

http://reply.papertrans.cn/87/8636/863530/863530_24.png

MORPH 发表于 2025-3-25 21:27:31

http://reply.papertrans.cn/87/8636/863530/863530_25.png

和音 发表于 2025-3-26 01:09:08

Protecting Consumer Data in Composite Web Servicesth untrusted online vendors. The system extends to support protection of customer privacy when multiple vendors interact in composite web services. A . is introduced for safe execution of sensitive customer information in a protected environment and provides accountability in the case of disputed transactions.

nonchalance 发表于 2025-3-26 07:28:45

http://reply.papertrans.cn/87/8636/863530/863530_27.png

LIMN 发表于 2025-3-26 09:17:44

http://reply.papertrans.cn/87/8636/863530/863530_28.png

Desert 发表于 2025-3-26 14:10:18

Distance-Bounding Proof of Knowledge to Avoid Real-Time Attackssucceeds to perform the distance-bounding process. However, frauds where a malicious prover and an intruder collaborate to cheat a verifier have been left as an open issue. In this paper, we provide a solution preventing both types of attacks.

foreign 发表于 2025-3-26 18:56:57

http://reply.papertrans.cn/87/8636/863530/863530_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Security and Privacy in the Age of Ubiquitous Computing; IFIP TC11 20th Inter Ryoichi Sasaki,Sihan Qing,Hiroshi Yoshiura Conference proceed