找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cryptology and Network Security; 17th International C Jan Camenisch,Panos Papadimitratos Conference proceedings 2018 Springer Nature Switze

[复制链接]
楼主: cerebral-cortex
发表于 2025-3-28 16:39:02 | 显示全部楼层
: Walking the Privacy Trailserver. In order to provide user-dependent services, service providers may ask the server to compute functions on the users’ data. We propose a new solution to this problem that guarantees data privacy (. an honest-but-curious server cannot access plaintexts), as well as that service providers can c
发表于 2025-3-28 22:35:15 | 显示全部楼层
DNS-DNS: DNS-Based De-NAT Schemeoriginal IP address, which is often viewed as a privacy feature, making it harder to identify the communication of individuals devices behind the NAT. . is the reverse process: re-identifying communication flowing into and out of the NAT. De-NAT can be used for traffic management, security, and lawf
发表于 2025-3-29 00:38:23 | 显示全部楼层
CLEF: Limiting the Damage Caused by Large Flows in the Internet Coreow detection has been previously explored, but the proposed approaches can be used on high-capacity core routers only at the cost of significantly reduced accuracy, due to their otherwise too high memory and processing overhead. We propose CLEF, a new large-flow detection scheme with low memory requ
发表于 2025-3-29 06:02:59 | 显示全部楼层
Towards Video Compression in the Encrypted Domain: A Case-Study on the H264 and HEVC Macroblock Procs, so-called macroblocks, and is mainly divided into four operations: color conversion, Discrete Cosine Transform (DCT), quantization and entropic encoding. This operation is carried out easily on non-encrypted image. In this paper, we consider the case where such an execution is done in the encrypt
发表于 2025-3-29 09:34:45 | 显示全部楼层
发表于 2025-3-29 13:34:49 | 显示全部楼层
发表于 2025-3-29 18:28:32 | 显示全部楼层
The Relation Between CENC and NEMO up to the birthday bound. In this work we consider two approaches in literature to improve it to beyond birthday bound security: CENC by Iwata (FSE 2006) and its generalization NEMO by Lefranc et al. (SAC 2007). Whereas recent discoveries on CENC argued optimal security, the state of the art of NEM
发表于 2025-3-29 22:41:26 | 显示全部楼层
On the Efficiency of ZMAC-Type Modesicient and highly secure MAC based on tweakable blockcipher (TBC). . achieves the so-called beyond-birthday-bound security: security up to . TBC calls, using a TBC with the input-block space . and the tweak space . where . is a set with . and is used for tweak separations. In the hash function, the
发表于 2025-3-30 01:13:30 | 显示全部楼层
发表于 2025-3-30 04:50:47 | 显示全部楼层
Enhanced Security of Attribute-Based Signatures security of ABS by presenting a strengthened simulation-based privacy definition and the first attribute-based signature functionality in the framework of universal composability (UC). Additionally, we show that the UC definition is equivalent to our strengthened experiment-based security definitio
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-6-29 08:06
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表