找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Computer Security -- ESORICS 2009; 14th European Sympos Michael Backes,Peng Ning Conference proceedings 2009 Springer-Verlag Berlin Heidelb

[复制链接]
楼主: 尖酸好
发表于 2025-3-23 12:15:41 | 显示全部楼层
https://doi.org/10.1007/978-981-10-7632-9t regulations (e.g., the Sarbanes-Oxley act and the Securities and Exchange Commission rule) mandate secure retention of important business records for several years. We provide a mechanism to authenticate bulk repositories of archived documents. In our approach, a space efficient local data structu
发表于 2025-3-23 17:54:41 | 显示全部楼层
Homocysteine in Occlusive Vascular Diseaseous methods are all limited in analyzing only plain-text communications wherein the exchanged messages are not encrypted. In this paper, we propose ReFormat, a system that aims at deriving the message format even when the message is encrypted. Our approach is based on the observation that an encrypt
发表于 2025-3-23 19:50:58 | 显示全部楼层
发表于 2025-3-24 01:32:19 | 显示全部楼层
发表于 2025-3-24 02:48:11 | 显示全部楼层
发表于 2025-3-24 06:53:48 | 显示全部楼层
User-Centric Handling of Identity Agent Compromisefor users. We believe that an identity management system (IdMS) that empowers users to become aware of how and when their identity credentials are used is critical for the success of such online services. Furthermore, rapid revocation and recovery of potentially compromised credentials is desirable.
发表于 2025-3-24 14:00:59 | 显示全部楼层
The Coremelt Attackt the victim host against undesired traffic..We present Coremelt, a new attack mechanism, where attackers only send traffic between each other, and not towards a victim host. As a result, none of the attack traffic is unwanted. The Coremelt attack is powerful because among . attackers, there are .(.
发表于 2025-3-24 17:16:30 | 显示全部楼层
Lightweight Opportunistic Tunneling (LOT)ld automatically and securely establish efficient tunnel, encapsulating packets sent between them. This allows . to discard packets which use .’s network addresses but were not sent via . (i.e. are spoofed) and vice verse..LOT is practical: it is easy to manage (‘plug and play’, no coordination betw
发表于 2025-3-24 21:18:10 | 显示全部楼层
Hide and Seek in Time — Robust Covert Timing Channelsrk communication. Previous results used encoding mechanisms that are either easy to detect with statistical analysis, thus spoiling the purpose of a covert channel, and/or are highly sensitive to channel noise, rendering them useless in practice. In this paper, we introduce a novel covert timing cha
发表于 2025-3-25 02:53:21 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-4 21:01
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表