无聊的人 发表于 2025-3-28 16:49:05

http://reply.papertrans.cn/87/8636/863592/863592_41.png

PHON 发表于 2025-3-28 18:45:01

http://reply.papertrans.cn/87/8636/863592/863592_42.png

employor 发表于 2025-3-29 01:14:27

Implementing a Formally Verifiable Security Protocol in Java Cardhe aim is to consider the decisions that have to be made in the development of such an implementation in a systematic way, and to investigate the possibilities of formal specification and verification in the design process and for the final implementation.

退潮 发表于 2025-3-29 03:11:16

Dieter Hutter,Günter Müller,Markus UllmannIncludes supplementary material:

过时 发表于 2025-3-29 07:56:18

http://reply.papertrans.cn/87/8636/863592/863592_45.png

Shuttle 发表于 2025-3-29 12:04:05

Cyber Assist Project and Its Security Requirementormation processing technology (IT hereafter) in all situations of daily life..Traditional IT is accessible only through computers sitting on a desktop. Its accessibility is broadening recently with the spread of mobile devices including mobile phones with i-mode. Nevertheless, such technology is us

吹牛大王 发表于 2025-3-29 15:59:09

Security in Pervasive Computingund everywhere” is not to be taken in the narrow sense of ”a computer on every desk” but rather in that of embedding computing and communication capabilities into all the everyday objects that surround us..Various embodiments of this vision have been proposed over the past fifteen years by researche

idiopathic 发表于 2025-3-29 19:58:39

The Importance of High Assurance Security in Pervasive Computing is essential to defeating the attacks of sophisticated penetrators, and must be combined with countermeasures to defeat a variety of physical attacks, including threats such as power analysis, RF leakage, and fault insertion. The argument will be supported with examples from IBM’s work on developme

常到 发表于 2025-3-30 01:38:23

http://reply.papertrans.cn/87/8636/863592/863592_49.png

溃烂 发表于 2025-3-30 06:33:37

http://reply.papertrans.cn/87/8636/863592/863592_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Security in Pervasive Computing; First International Dieter Hutter,Günter Müller,Markus Ullmann Conference proceedings 2004 The Editor(s)