找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Computer Security - ESORICS 2008; 13th European Sympos Sushil Jajodia,Javier Lopez Conference proceedings 2008 Springer-Verlag Berlin Heide

[复制链接]
楼主: EFFCT
发表于 2025-3-28 15:22:59 | 显示全部楼层
https://doi.org/10.1007/978-3-030-54226-9s the essence of Kerberos protocols, which are widely deployed in a large scale of computer networks. Browser-based Kerberos protocols are the derivates with the exception that the Kerberos client application is a commodity Web browser. Whereas the native Kerberos protocol has been repeatedly peer-r
发表于 2025-3-28 19:14:29 | 显示全部楼层
https://doi.org/10.1007/978-3-030-54226-9l (i.e. generic) infrastructure and protocol to either prevent IDF (by detecting attempts thereof), or limit its consequences (by identifying cases of previously undetected IDF). . is a capture resilient one-time password scheme, whereby each user must carry a personal trusted device used to generat
发表于 2025-3-28 23:47:37 | 显示全部楼层
https://doi.org/10.1007/978-3-030-54226-9eneric question in disclosure analysis is whether a data snooper can deduce any sensitive information from available statistical moments. To address this question, we consider various types of possible disclosure based on the exact bounds that a snooper can infer about any protected moments from ava
发表于 2025-3-29 06:24:55 | 显示全部楼层
https://doi.org/10.1007/978-3-030-54226-9ole that database servers are playing. Although a number of research projects have been done to tackle the emerging data corruption threats, existing mechanisms are still limited in meeting four highly desired requirements: ., ., . for read-only transactions, . for read-write transactions. In this p
发表于 2025-3-29 10:42:42 | 显示全部楼层
发表于 2025-3-29 12:08:31 | 显示全部楼层
发表于 2025-3-29 19:17:24 | 显示全部楼层
https://doi.org/10.1057/9780230286580ndividuals (e.g. customers, partners, employees etc.). Therefore, privacy issues are becoming increasingly important. In this paper we model the risk that an IT firm is exposed to, as a result of potential privacy violation incidents. The proposed model is based on random utility modeling and aims a
发表于 2025-3-29 22:11:21 | 显示全部楼层
发表于 2025-3-29 23:53:50 | 显示全部楼层
https://doi.org/10.1007/978-1-4020-8239-9, one hop in the overlay network can consist of multiple Internet Protocol (IP) hops. Therefore, the length of the overlay multi-hop path must be reduced in order to maintain a good balance between the cost and the benefit provided by the anonymity facility. Unfortunately, the simple Time-To-Live (T
发表于 2025-3-30 06:09:40 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-7-4 01:13
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表