promote 发表于 2025-3-28 14:45:01

ROP-Hunt: Detecting Return-Oriented Programming Attacks in Applications,ing existing small code sequences. Although many defense mechanisms have been proposed, some new variants of ROP attack can easily circumvent them..In this paper, we present a new tool, ROP-Hunt, that can defend against ROP attacks based on the differences between normal program and ROP malicious co

啮齿动物 发表于 2025-3-28 22:40:50

On the Security of a Threshold Anonymous Authentication Protocol for VANETs,enges, where security assurance and privacy protection are two primary concerns. Without the security and privacy guarantees, attackers could track their interested vehicles by collecting and analyzing their traffic messages. Hence, anonymous message authentication is an essential requirement of VAN

泥沼 发表于 2025-3-28 22:58:53

http://reply.papertrans.cn/87/8637/863640/863640_43.png

诱拐 发表于 2025-3-29 04:50:17

http://reply.papertrans.cn/87/8637/863640/863640_44.png

污点 发表于 2025-3-29 11:13:41

http://reply.papertrans.cn/87/8637/863640/863640_45.png

失眠症 发表于 2025-3-29 11:51:41

http://reply.papertrans.cn/87/8637/863640/863640_46.png

新鲜 发表于 2025-3-29 16:10:15

Defect Analysis and Risk Assessment of Mainstream File Access Control Policies,ontrol should include two layers, the first layer specifies file access rights the user has, and the second layer specifies file access rights of a program at current moment. Mainstream file access control policies can’t meet the second layer requirements, and this is the very reason why current com

温和女孩 发表于 2025-3-29 21:54:03

http://reply.papertrans.cn/87/8637/863640/863640_48.png

Generalize 发表于 2025-3-30 00:43:12

An Improved Asymmetric Searchable Encryption Scheme,rs”, “identities encrypted” and “a useless component”. Findings suggest that the proposed scheme, while maintaining the established framework, perfectly resolves all the aforementioned flaws in the previous scheme.

尽管 发表于 2025-3-30 04:29:49

Big Data Security Analytic for Smart Grid with Fog Nodes,), to detect Non-Technical Loss fraud in Smart Grid. Compared to its original version, FNFD, Mapreduce-style FNFD can utilize the ability of Cloud, Fog, and BDA, and thus can solve big data security issues.
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Security, Privacy, and Anonymity in Computation, Communication, and Storage; 9th International Co Guojun Wang,Indrakshi‘Ray,Sabu M. Thampi