Increment 发表于 2025-3-25 03:59:42

A Trust-Augmented Voting Scheme for Collaborative Privacy Management,ractive features, much to users’ dismay, however, they are likely to expose users private information (unintentionally)..In this paper, we propose an approach which is intended for addressing the problem of collaboratively deciding privacy policies for, but not limited to, shared photos. Our propose

发展 发表于 2025-3-25 09:50:17

Universally Composable NIZK Protocol in an Internet Voting Scheme,ot in an Internet voting scheme. We first describe the Internet voting scheme followed by the explanation of the NIZK protocol for ballot verification in that voting scheme. We then define the ideal functionalities using the UC framework and evaluate the NIZK protocol by using these ideal functional

弹药 发表于 2025-3-25 13:03:01

Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA,nctions. It is well-known that an intruder who uses algebraic equivalences of such functions can mount attacks that would be impossible if the cryptographic functions did not satisfy such equivalences. In practice, however, protocols use a collection of well-known functions, whose algebraic properti

真繁荣 发表于 2025-3-25 17:15:48

http://reply.papertrans.cn/87/8636/863545/863545_24.png

Maximizer 发表于 2025-3-25 21:11:34

http://reply.papertrans.cn/87/8636/863545/863545_25.png

汇总 发表于 2025-3-26 02:26:39

Stateful Authorization Logic:,ever, so far, there has been no systematic study of proof theory that incorporates system state, upon which access policies often rely. The present paper fills this gap by presenting the design and proof theory of an authorization logic BL that, among other features, includes direct support for exte

广大 发表于 2025-3-26 06:28:48

http://reply.papertrans.cn/87/8636/863545/863545_27.png

Euphonious 发表于 2025-3-26 11:34:12

Extending an RFID Security and Privacy Model by Considering Forward Untraceability,ty proof. In the literature, there are a few formal models that consider forward untraceability. In ASIACRYPT 2007, Vaudenay presented an new security and privacy model for RFID that combines early models to more understandable one. In this paper, we revisit Vaudenay’s model and modify it by conside

interpose 发表于 2025-3-26 14:49:20

http://reply.papertrans.cn/87/8636/863545/863545_29.png

植物茂盛 发表于 2025-3-26 20:16:04

,A Case Study in Decentralized, Dynamic, Policy-Based, Authorization and Trust Management – Automateand delegation explicitly and to form chains of trusts. We use these constructs in our case study to specify and reason about dynamic, ad-hoc trust relationships between airlines and contractors of suppliers of software that has to be loaded into airplanes.
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Security and Trust Management; 6th International Wo Jorge Cuellar,Javier Lopez,Alexander Pretschner Conference proceedings 2011 Springer-Ve