找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Communications and Multimedia Security; 8th IFIP TC-6 TC-11 David Chadwick,Bart Preneel Conference proceedings 20051st edition IFIP Intern

[复制链接]
楼主: Corrugate
发表于 2025-3-28 15:03:10 | 显示全部楼层
Threat Modelling for Active Directoryased on the STRIDE classification methodology. The paper also provides outline descriptions of countermeasures that can be deployed to protect against the different threats and vulnerabilities identified here.
发表于 2025-3-28 22:40:18 | 显示全部楼层
发表于 2025-3-29 01:34:48 | 显示全部楼层
Analysis of the DVB Common Scrambling Algorithma stream and a block cipher, apparently for a larger security margin. In this paper we set out to analyze the block cipher and the stream cipher separately and give an overview of how they interact with each other. We present a practical attack on the stream cipher. Research on the block cipher so f
发表于 2025-3-29 06:23:35 | 显示全部楼层
An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intrudery used in other types of protocols (for example, in authentication protocols). These message constructors include blind signatures, commitments and zero-knowledge proofs. Furthermore, a standard formalization of the Dolev-Yao intruder [6] does not take into account these message constructors, nor do
发表于 2025-3-29 08:52:35 | 显示全部楼层
Robust Visual Hashing Using JPEG 2000obust visual feature extraction. We propose to use the wavelet-based JPEG2000 image compression algorithm for feature extraction. We discuss the sensitivity of our proposed method against different malicious data modifications including local image alterations and Stirmark attacks.
发表于 2025-3-29 15:00:53 | 显示全部楼层
发表于 2025-3-29 17:25:48 | 显示全部楼层
发表于 2025-3-29 22:57:23 | 显示全部楼层
Communications and Multimedia Security978-0-387-24486-0Series ISSN 1868-4238 Series E-ISSN 1868-422X
发表于 2025-3-30 00:17:29 | 显示全部楼层
发表于 2025-3-30 06:36:04 | 显示全部楼层
Soil Dynamics and Foundation Modelingon environments. The approach used is based on the STRIDE classification methodology. The results presented provide also some general guidelines and countermeasures against the different attacks that can exploit the identified vulnerabilities.
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-5 01:53
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表