找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Computer Security – ESORICS 2020; 25th European Sympos Liqun Chen,Ninghui Li,Steve Schneider Conference proceedings 2020 Springer Nature Sw

[复制链接]
楼主: PED
发表于 2025-3-25 07:05:39 | 显示全部楼层
Hardware Fingerprinting for the ARINC 429 Avionic Bus with physical access to the bus is able to replace a transmitter by a rogue device, and receivers will accept its malicious data as they have no method of verifying the authenticity of messages..Updating the protocol would close off security loopholes in new aircrafts but would require thousands of
发表于 2025-3-25 09:38:01 | 显示全部楼层
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishabiliits applications such as searchable encryption. Namely, we find that until now there is no discussion whether the widely used indistinguishability-based notion of anonymity for IBE implies simulation-based definition of anonymity, which directly captures the intuition that recipients’ IDs are not le
发表于 2025-3-25 15:28:46 | 显示全部楼层
SHECS-PIR: Somewhat Homomorphic Encryption-Based Compact and Scalable Private Information Retrievalthe server any information about the requested element. PIR is an important building block of many privacy-preserving protocols, and its efficient implementation is therefore of prime importance. Several concrete, practical PIR protocols have been proposed and implemented so far, particularly based
发表于 2025-3-25 19:31:51 | 显示全部楼层
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryptionual messages by repeatedly updating decryption keys without communicating with senders. PE is an essential tool for constructing many interesting applications, such as asynchronous messaging systems, forward-secret zero round-trip time protocols, public-key watermarking schemes and forward-secret pr
发表于 2025-3-25 21:18:49 | 显示全部楼层
发表于 2025-3-26 03:43:59 | 显示全部楼层
Detection by Attack: Detecting Adversarial Samples by Undercover Attackmodifications to the inputs of a network classifier, can fool the classifier and lead to wrong predictions. These modified inputs are called adversarial samples. In order to resolve this challenge, this paper proposes a novel and effective framework called . (DBA) to detect adversarial samples by ..
发表于 2025-3-26 05:25:42 | 显示全部楼层
Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender SystemsPart of this acquired knowledge is public and can be accessed by anyone through the Internet. Unfortunately, that same knowledge can be used by competitors or malicious users. A large body of research proposes methods to attack recommender systems, but most of these works assume that the attacker kn
发表于 2025-3-26 09:44:41 | 显示全部楼层
发表于 2025-3-26 14:24:50 | 显示全部楼层
Fooling Primality Tests on Smartcards.], where the authors analysed many open-source libraries and constructed pseudoprimes fooling the primality testing functions. However, in the case of smartcards, often there is no way to invoke the primality test directly, so we trigger it by replacing (EC)DSA and (EC)DH prime domain parameters by
发表于 2025-3-26 19:48:08 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 吾爱论文网 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
QQ|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-8-8 20:37
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表