找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Applied Cryptography and Network Security Workshops; ACNS 2021 Satellite Jianying Zhou,Chuadhry Mujeeb Ahmed,Cong Wang Conference proceedi

[复制链接]
楼主: Tamoxifen
发表于 2025-3-23 11:50:57 | 显示全部楼层
Quantum Computing Threat Modelling on a Generic CPS Setupdies against the threat. At the algorithm-level, the two most popular public-key cryptosystems, RSA and ECC, are vulnerable to quantum cryptanalysis using Shor’s algorithm, while symmetric key and hash-based cryptosystems are weakened by Grover’s algorithm. Less is understood at the implementation l
发表于 2025-3-23 15:03:26 | 显示全部楼层
发表于 2025-3-23 19:05:04 | 显示全部楼层
发表于 2025-3-24 01:35:11 | 显示全部楼层
WiP: Distributed Intrusion Detection System for TCP/IP-Based Connections in Industrial Environments A digitized facility needs the possibility of communication between distributed nodes, e.g. to react to events or to provide useful information to adjust the production process. However, processes of communication can be misused by attackers. Security holes in different information systems can be fo
发表于 2025-3-24 05:59:16 | 显示全部楼层
Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchainusceptible towards faults and physical attacks. In this context, we discuss recently proposed Manipulation-of-Demand via IoT attack, False Data Injection Attacks and Electric Fault Attacks. These attacks directly or indirectly can lead to localized blackout, falsified load forecasting, imbalance in
发表于 2025-3-24 09:26:03 | 显示全部楼层
Hoang Yen Phuong,Phuong Quyen Vo These are needed to operate a supply chain efficiently and allow timely deliverables to consumers. In our work, we identify and map a typical business process to demonstrate how we can securely allow participants to interact with smart contracts and discover potential use cases for supply chains.
发表于 2025-3-24 14:19:34 | 显示全部楼层
Phuong Quyen Vo,Hoang Yen Phuonglem that it is difficult to identify the identity of network interactive users. Yet, user identification raises questions about user privacy. In the last paper [[, we proposed a user identification method based on Mining Web Usage Profiles from Proxy Logs. For the previous user identification system
发表于 2025-3-24 18:48:37 | 显示全部楼层
发表于 2025-3-24 19:39:23 | 显示全部楼层
Hoang Yen Phuong,Phuong Quyen Vocryptography, many blind signature schemes have been proposed. Among them, Verma . designed an identity-based blind signature scheme with message recovery (IDBS-MR). Unfortunately, after our cryptanalysis, their scheme cannot satisfy untraceability, which enables the signer to break the anonymity of
发表于 2025-3-25 02:45:23 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-13 07:12
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表