找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Cryptology and Network Security; 13th International C Dimitris Gritzalis,Aggelos Kiayias,Ioannis Askoxyl Conference proceedings 2014 Spring

[复制链接]
楼主: energy
发表于 2025-3-28 18:07:28 | 显示全部楼层
发表于 2025-3-28 20:27:58 | 显示全部楼层
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/240601.jpg
发表于 2025-3-29 01:33:05 | 显示全部楼层
Bootstrappable Identity-Based Fully Homomorphic Encryption,-based setting. Our attribute-based scheme is the first to support homomorphic evaluation on ciphertexts with different attributes. Finally, we characterize presently-known leveled IBFHE schemes with a view to developing a “compiler” from a leveled IBFHE scheme to a bootstrappable IBFHE scheme, and
发表于 2025-3-29 05:17:45 | 显示全部楼层
FFT Key Recovery for Integral Attack,ks against ., CLEFIA, and AES. As a result, 8-round .. can be attacked with about an approximate time complexity of 2.. Moreover, a 6-round AES and 12-round CLEFIA can be attacked with approximate time complexities of 2. and 2., respectively.
发表于 2025-3-29 09:57:04 | 显示全部楼层
Negotiating DNSSEC Algorithms over Legacy Proxies,also larger than alternatives; the likely reason is lack of negotiation mechanisms. We present a ., allowing name-servers to send responses containing only the keys and signatures required by the requesting resolver. Our design is compatible with intermediary proxies, and even with legacy proxies, t
发表于 2025-3-29 15:00:32 | 显示全部楼层
A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System,nd memorable mapping without a trusted authority. GNS uses the transitivity in the SDSI design to replace the trusted root with secure delegation of authority, thus making petnames useful to other users while operating under a very strong adversary model. In addition to describing the GNS design, we
发表于 2025-3-29 15:38:37 | 显示全部楼层
Converting PKI-Based Authenticated Key Exchange to Identity-Based,t can be instantiated from various kinds of number-theoretic assumptions such as RSA and lattices as well as Diffie-Hellman variants) thanks to rich instantiability of known PKI-AKE schemes in the pre-specified peer model.
发表于 2025-3-29 20:51:45 | 显示全部楼层
Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi an honest receiver, we use the framework presented by Küsters et al. for the cryptographic verification of Java programs. As part of our work, we add oblivious transfer to the set of cryptographic primitives supported by the framework. This is a general contribution beyond our results for concrete
发表于 2025-3-30 02:54:45 | 显示全部楼层
Mining API Calls and Permissions for Android Malware Detection,ng Naive Bayesian as well as K-Nearest Neighbour classifiers. Proposed models are able to detect real malwares in the wild and achieve an accuracy of 95.1% and true positive rate with highest value one.
发表于 2025-3-30 05:35:19 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-7-5 19:06
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表