找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Applied Cryptography in Computer and Communications; First EAI Internatio Bo Chen,Xinyi Huang Conference proceedings 2021 ICST Institute fo

[复制链接]
楼主: cerebellum
发表于 2025-3-28 16:17:27 | 显示全部楼层
发表于 2025-3-28 22:33:29 | 显示全部楼层
A Security Enhanced Key Management Service for ARM Pointer Authenticationrity (CFI) is one of the most effective and popular solution, and integrated with the modish hardware makes it even more valuable, for instance, the ARM Pointer Authentication (PA), which can generate a message authentication code for a pointer and verify it to ensure the pointer is intact. However,
发表于 2025-3-28 23:22:30 | 显示全部楼层
Privacy-Preserving ECC-Based Three-Factor Authentication Protocol for Smart Remote Vehicle Control Sands which allows people to remotely control vehicles through the Internet. However, SVRC’s convenience brings security challenges that the related SRVC’s protocol needs to be enhanced with identity authentication mechanism for both users and their vehicles, in case of illegal intrusion without iden
发表于 2025-3-29 04:42:55 | 显示全部楼层
Efficient and Private Divisible Double Auction in Trusted Execution Environmentxtensively studied. In particular, divisible double auction allows both buyers and sellers to dynamically submit their prices until convergence. However, severe privacy concerns may arise in the double auctions since all the agents may have to disclose their sensitive data such as the bid profiles (
发表于 2025-3-29 09:53:22 | 显示全部楼层
Parallel Implementation and Optimization of SM4 Based on CUDAf SM4 is given. Based on the characteristics of CUDA (Compute Unified Device Architecture), a CPU-GPU (Central Processing Unit-Graphics Processing Unit) scheme of SM4 is proposed by exploiting the structure property. Moreover, this scheme is further improved by introducing the page-locked memory and
发表于 2025-3-29 13:21:11 | 显示全部楼层
Another Algebraic Decomposition Method for Masked Implementationation of block ciphers has been attracting active research. It is an obstacle to efficient masked implementation that the complexity of an evaluation of multiplication is quadratic in the order of masking. A direct approach to this problem is to explore methods to reduce the number of multiplication
发表于 2025-3-29 18:06:15 | 显示全部楼层
发表于 2025-3-29 23:21:36 | 显示全部楼层
MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile Devicesged in the mobile devices. To protect sensitive data, encryption is often used but, traditional encryption is vulnerable to coercive attacks in which the device owner is coerced by the adversary to disclose the decryption key. To defend against the coercive attacks, Plausibly Deniable Encryption (PD
发表于 2025-3-30 03:42:01 | 显示全部楼层
Recent Advances in the Web PKI and the Technical Challenges in SCMSadvances in the Web PKI include certificate transparency and push-based revocation, which improve the trustworthiness and performance of TLS and HTTPS, respectively. Meanwhile, SCMS is a specialized PKI system designed for V2V communications. In this paper, we analyze the design principles of certif
发表于 2025-3-30 07:33:28 | 显示全部楼层
A Thieves Identification Scheme for Prepaid Systems in Smart Gridsals from an operation center before consumption. According to the credentials, consumers can use the corresponding amount of electricity. Based on the dynamic .-times anonymous authentication protocol, the scheme can achieve thieves identification and privacy preservation at the same time without th
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-15 10:21
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表